Cargando…
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Well-known security experts decipher the most challenging aspect of cloud computing-security. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
John Wiley & Sons Inc
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412282 |
_version_ | 1780923881762062336 |
---|---|
author | Krutz, Ronald L Vines, Russell Dean |
author_facet | Krutz, Ronald L Vines, Russell Dean |
author_sort | Krutz, Ronald L |
collection | CERN |
description | Well-known security experts decipher the most challenging aspect of cloud computing-security. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unpa |
id | cern-1412282 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | John Wiley & Sons Inc |
record_format | invenio |
spelling | cern-14122822021-04-22T00:45:39Zhttp://cds.cern.ch/record/1412282engKrutz, Ronald LVines, Russell DeanCloud Security: A Comprehensive Guide to Secure Cloud ComputingComputing and ComputersWell-known security experts decipher the most challenging aspect of cloud computing-security. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unpaJohn Wiley & Sons Incoai:cds.cern.ch:14122822010 |
spellingShingle | Computing and Computers Krutz, Ronald L Vines, Russell Dean Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title | Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title_full | Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title_fullStr | Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title_full_unstemmed | Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title_short | Cloud Security: A Comprehensive Guide to Secure Cloud Computing |
title_sort | cloud security: a comprehensive guide to secure cloud computing |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412282 |
work_keys_str_mv | AT krutzronaldl cloudsecurityacomprehensiveguidetosecurecloudcomputing AT vinesrusselldean cloudsecurityacomprehensiveguidetosecurecloudcomputing |