BIBLIOTECA HNO. HILDEBERTO JUAN

Imagen de cubierta local
Imagen de cubierta local

Building the Infrastructure for cloud security : a solutions view / Raghu Yeluri, Enrique Castro Leon.

Por: Colaborador(es): Tipo de material: TextoTextoDetalles de publicación: New York : Apress Open, 2014.Descripción: 216 páginas : IlustracionesISBN:
  • 9781430261452
Tema(s): Clasificación CDD:
  • 004.6782 Y43b 23
Contenidos parciales:
Chapter 1: CLoud computing basic. -- Chapter 2: The trusted cloud: addressing security and compliance. -- Chapter 3: Platform boot integrity: foundation for trusted compute pools. -- Chapter 4: Attestation: proving trustability. -- Chapter 5: Boundary control in the cloud: geo-tagging and asset tagging. -- Chapter 6: Network security in the cloud. -- Chapter 7: Identy management and control for clouds. -- Chapter 8: Trusted virtual machines: ensuring the integrity of virtual machines in the cloud. -- Chapter 9: A reference design for secure cloud bursting.
Resumen: For cloud users and providers alike, security is an everyday concern, yet there ar very few boks covering cloud security as a main subject. this book will help address this information gap from an information technology solution nd usage-centric view of cloud infrastructure security.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Libros Biblioteca Central CIENCIAS PURAS 004.6782 Y43b (Navegar estantería(Abre debajo)) Ej.1 Disponible B0507

Chapter 1: CLoud computing basic. -- Chapter 2: The trusted cloud: addressing security and compliance. -- Chapter 3: Platform boot integrity: foundation for trusted compute pools. -- Chapter 4: Attestation: proving trustability. -- Chapter 5: Boundary control in the cloud: geo-tagging and asset tagging. -- Chapter 6: Network security in the cloud. -- Chapter 7: Identy management and control for clouds. -- Chapter 8: Trusted virtual machines: ensuring the integrity of virtual machines in the cloud. -- Chapter 9: A reference design for secure cloud bursting.

For cloud users and providers alike, security is an everyday concern, yet there ar very few boks covering cloud security as a main subject. this book will help address this information gap from an information technology solution nd usage-centric view of cloud infrastructure security.

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

Imagen de cubierta local