CSA guide to cloud computing : implementing cloud privacy and security /

Saved in:
Bibliographic Details
Main Authors: Samani, Raj (Author)
Group Author: Honan, Brian (Editor); Reavis, Jim; Jirasek, Vladimir
Published: Elsevier,
Publisher Address: Waltham :
Publication Dates: [2015]
Literature type: Book
Language: English
Subjects:
Carrier Form: xx, 216 pages : illustration ; 24 cm
Bibliography: Includes bibliographical references and index.
ISBN: 9780124201255 (paperback) :
Index Number: QA76
CLC: TP393.08
Call Number: TP393.08/S187
Contents: Machine generated contents note: ch. 1 Cloud Computing, What Is It And What's The Big Deal? -- Defining Cloud Computing -- Economic Opportunities For Cloud Computing -- The Cloud Is "Not" Secure -- End Notes -- ch. 2 Selecting And Engaging With A Cloud Service Provider -- Security, Trust And Assurance Repository Initiative -- Engaging With The Cloud Service Provider -- End Notes -- ch. 3 The Cloud Threat Landscape -- The Cloud Threat Landscape -- Notorious Nine -- Additional Cloud Threats -- End Notes -- ch. 4 Secure Cloud For Mobile Computing -- Mobile Top Threats: Evil 8.0 -- Addressing The Threat: Mobile Components For Consideration -- End Notes -- ch. 5 Making The Move Into The Cloud -- Cloud Computing Checklist -- Security For The Cloud -- End Notes -- ch. 6 Certification For Cloud Service Providers -- Certification For Cloud Service Providers -- End Notes -- ch. 7 The Privacy Imperative -- Does Cloud Computing Make My Data Any Less Private? -- Privacy Level Agreement -- Data Protection Certification -- End Notes -- ch. 8 Cloud Security Alliance Research -- Big Data Working Group -- Cloud Data Governance -- Cloudcert -- Cloudtrust Protocol -- Enterprise Architecture Working Group -- Incident Management And Forensics -- Innovation Initiative -- Security As A Service -- Security Guidance For Critical Areas Of Focus In Cloud Computing -- Software Defined Perimeter -- End Notes -- ch. 9 Dark Clouds, What To Do In The Event Of A Security Incident -- Building A Security Incident Response Team -- Incident Response Challenges In The Cloud -- The Future -- End Notes -- ch. 10 The Future Cloud -- More, More, And More -- Cloud Computing For Critical Infrastructure -- Defining The Security Requirements For Tomorrow's Cloud -- End Notes.