Cargando…

Securing the Cloud: Cloud Computer Security Techniques and Tactics

As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your pe...

Descripción completa

Detalles Bibliográficos
Autor principal: Winkler, Vic (JR)
Lenguaje:eng
Publicado: Elsevier 2011
Materias:
Acceso en línea:http://cds.cern.ch/record/1413366
_version_ 1780923955443400704
author Winkler, Vic (JR)
author_facet Winkler, Vic (JR)
author_sort Winkler, Vic (JR)
collection CERN
description As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o
id cern-1413366
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
publisher Elsevier
record_format invenio
spelling cern-14133662021-04-22T00:42:26Zhttp://cds.cern.ch/record/1413366engWinkler, Vic (JR)Securing the Cloud: Cloud Computer Security Techniques and TacticsComputing and ComputersAs companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, oElsevieroai:cds.cern.ch:14133662011
spellingShingle Computing and Computers
Winkler, Vic (JR)
Securing the Cloud: Cloud Computer Security Techniques and Tactics
title Securing the Cloud: Cloud Computer Security Techniques and Tactics
title_full Securing the Cloud: Cloud Computer Security Techniques and Tactics
title_fullStr Securing the Cloud: Cloud Computer Security Techniques and Tactics
title_full_unstemmed Securing the Cloud: Cloud Computer Security Techniques and Tactics
title_short Securing the Cloud: Cloud Computer Security Techniques and Tactics
title_sort securing the cloud: cloud computer security techniques and tactics
topic Computing and Computers
url http://cds.cern.ch/record/1413366
work_keys_str_mv AT winklervicjr securingthecloudcloudcomputersecuritytechniquesandtactics