Cargando…
Securing the Cloud: Cloud Computer Security Techniques and Tactics
As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your pe...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1413366 |
_version_ | 1780923955443400704 |
---|---|
author | Winkler, Vic (JR) |
author_facet | Winkler, Vic (JR) |
author_sort | Winkler, Vic (JR) |
collection | CERN |
description | As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o |
id | cern-1413366 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-14133662021-04-22T00:42:26Zhttp://cds.cern.ch/record/1413366engWinkler, Vic (JR)Securing the Cloud: Cloud Computer Security Techniques and TacticsComputing and ComputersAs companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, oElsevieroai:cds.cern.ch:14133662011 |
spellingShingle | Computing and Computers Winkler, Vic (JR) Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title_full | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title_fullStr | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title_full_unstemmed | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title_short | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
title_sort | securing the cloud: cloud computer security techniques and tactics |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1413366 |
work_keys_str_mv | AT winklervicjr securingthecloudcloudcomputersecuritytechniquesandtactics |