Normal view MARC view ISBD view

Protecting information assets and IT infrastructure in the cloud / by Ravi Das and Preston de Guise.

By: Das, Ravindra [author.].
Contributor(s): De Guise, Preston [author.].
Material type: materialTypeLabelBookPublisher: Boca Raton, FL : CRC Press, 2019Description: 1 online resource (xviii, 300 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9780429261602; 0429261608; 9780429551895; 0429551894; 9780429523724; 0429523726; 9780429537196; 0429537190.Subject(s): COMPUTERS / Information Technology | COMPUTERS / Security / General | POLITICAL SCIENCE / Political Freedom & Security / International Security | Cloud computing -- Security measures | Computer networks -- Security measuresDDC classification: 004.67/82 Online resources: Taylor & Francis | OCLC metadata license agreement
Contents:
1. Introduction to the CloudComputing Environment2. Amazon Web Services3. Threats and Risks to the Cloud Infrastructure and Risk Mitigation Strategies4. Cloud Data Protection5. Conclusion
Summary: Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
    average rating: 0.0 (0 votes)
No physical items for this record

1. Introduction to the CloudComputing Environment2. Amazon Web Services3. Threats and Risks to the Cloud Infrastructure and Risk Mitigation Strategies4. Cloud Data Protection5. Conclusion

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.

Includes index.

OCLC-licensed vendor bibliographic record.

There are no comments for this item.

Log in to your account to post a comment.