Building the Infrastructure for Cloud Security: A Solutions View (Raghu Yeluri, et al)

 
0.0 (0)
Building the Infrastructure for Cloud Security: A Solutions View (Raghu Yeluri, et al)

The infrastructure, network, services, compliance, and user aspects of cloud security are all thoroughly covered in this book. In order to explain the actual and perceived risks and difficulties in implementing and managing services in a cloud architecture from a security perspective, it will give real-world case studies.

Security is a daily worry for both cloud customers and providers, but there aren't many books that focus primarily on cloud security. This book will contribute to filling this knowledge gap by approaching cloud infrastructure security from an IT solution and usage-centric perspective.

The key technological elements required to create and enable trusted clouds are highlighted in the book. Here is also an explanation of the security and compliance issues businesses have when moving mission-critical apps to the cloud, as well as how trusted clouds with hardware-based integrity may handle these issues.

  1. Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  2. Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  3. OpenStack-based reference architecture of the tenant-controlled virtual machine and workload protection in the cloud.
  4. A reference design to enable secure hybrid clouds for a cloud-bursting use case, providing infrastructure visibility and control to organizations.

Ebook Details

About the Authors
At Intel Corporation, Raghu Yeluri is a Principal Engineer and the lead Security Solutions Architect in the Data Center & Cloud Products Group. He focuses on technology projects, solution architectures, and usages related to virtualization and cloud security.
Publisher
Published
Published Date / Year
1st ed. edition (March 27, 2014); eBook (Open Access Edition)
License(s)
CC BY 4.0
Hardcover
244 pages
eBook Format
PDF and ePub
ISBN-10
1430261455
ISBN-13
978-1430261452 (Print) 978-1430261469 (Online)

Similar Programming & Computer Books

Optical Communication (Narottam Das)
In data processing, networking, and telecommunications systems, optical communication is incredibly helpful. It is made up of a transmitter that converts a message into an optical signal, a channel...
Advances in Optical Communication (Narottam Das)
The research, development, and design engineers from the teams in the manufacturing industry, academia, and communications industries are the target audience for this book. ...
Java 2 Network Security (Marco Pistoia, et al.)
With thorough coverage of the new Java 2 security models, this book offers the entire insiders' guide to protecting Java 2 enterprise applications. Developed to assist you in incorporating...
Cellular: An Economic and Business History of the International Mobile-Phone Industry (Daniel D. Garcia-Swartz, et al)
From the late 1970s to the present, charts the development of the global cellular industry. It took exceptional collaboration between businesses, governments, and industrial sectors for the mobile phone...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Christian Rathgeb, et al)
The first thorough compilation of research on the popular subject of digital face alteration, including DeepFakes, Face Morphing, and Reenactment, is offered in this open access book. ...
Hacking Exposed Computer Forensics (Aaron Philipp, et al)
With the aid of this fully updated, practical guide, you can identify and look into computer thieves of all shades.
Bayes Factors for Forensic Decision Analyses with R (Silvia Bozza, et al)
With the help of the R programming language, this book offers a self-contained introduction to computational Bayesian statistics. This free programming book, which primarily focuses on Bayes factors supported...

Others Programming Books by Apress

Dissecting a C# Application – Inside SharpDevelop (Christian Holm, et al)
Get a behind-the-scenes peek at an entire application while learning advanced.NET development techniques! A full-featured Integrated Development Environment created in C# is called SharpDevelop. ...
Practical Node.js: Building Real-World Scalable Web Apps (Azat Mardan)
Learn how to use professional development tools to create a variety of scalable real-world web apps. If you already have a basic understanding of Node.js, now is the time...
Ray Tracing Gems: High-Quality and Real-Time Rendering with DXR and Other APIs (Eric Haines, et al)
Anyone who is serious about rendering in real-time should own this book. Developers may now easily build real-time apps using ray tracing as a key component thanks to the...
Fashion Figures: How Missy the Mathlete Made the Cut (Melissa A. Borza)
This book emphasizes the external and internal challenges preteen and early-teen girls have when they excel in these topics and offers techniques for managing these pressures so that they...
Ray Tracing Gems II: Next Generation Real-Time Rendering with DXR, Vulkan, and OptiX (Adam Marrs, et al)
Anyone interested in real-time rendering must own this Open Access book. The pinnacle of video game graphics, ray tracing simulates the physical behavior of light to give even the...
Digital Video Concepts, Methods, and Metrics (Shahriar Akramullah)
For professionals in a variety of applications and professions, this book serves as a condensed reference.
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment (Daniel Blum)
Gain the support of your senior executives by using the advice in this thorough field guide to integrating a sound cybersecurity plan with your company.
Demystifying Internet of Things Security (Sunil Cheruvu, et al)
Examine the many security building blocks offered in the Internet of Things (IoT) platforms based on Intel Architecture (IA) to dispel common misconceptions about the IoT. ...
Data Parallel C++: Mastering DPC++ for Programming using C++ and SYCL (James Reinders, et al)
Learn how to use Data Parallelism to speed up C++ programs. C++ programmers can be at the vanguard of this fascinating and crucial new development, which is assisting in...
Practical Common Lisp (Peter Seibel)
It offers a novel perspective on the language, and the examples in the later chapters can be applied to your regular programming tasks.
Program Arcade Games: With Python and Pygame (Paul Vincent Craven)
To develop and create fun arcade games, learn Python and PyGame. You can learn how to make enjoyable and basic quizzes from this book, as well as how to...
Programming Persistent Memory: A Comprehensive Guide for Developers (Steve Scargall)
This book explains persistent memory technology and the reasons the market is buzzing with it. It discusses the needed hardware and operating system as well as how to set...
Rethinking Productivity in Software Engineering (Caitlin Sadowski, et al)
This open-access book compiles the knowledge from a seminar on productivity in software engineering, which brought together community leaders with the intention of reevaluating conventional definitions and measurements of...
Pro TBB: C++ Parallel Programming with Threading Building Blocks (Michael Voss, et al)
This book serves as a current tutorial for learning Threading Building Blocks for all C++ programmers (TBB). This book was written by professionals in TBB and parallel programming, and...
Pro HTML5 Programming: Powerful APIs for Richer Internet Application Development (Peter Lubbers, et al)
The content of this online version of the printed book began identical to that of the printed and ebook versions before being elevated to a new level. ...
Embedded Firmware Solutions: Development Best Practices for the Internet of Things (Jiming Sun, et al)
For the thousands of firmware designers, hardware engineers, architects, managers, and developers, this book is the ideal introduction and practical field guide to Intel's new firmware direction (including Quark...
Android on x86: An Introduction to Optimizing for Intel Architecture (Iggy Krajci, et al)
This book serves as a comprehensive resource for mindful programming and the particular difficulties and opportunities presented by x86 systems. It compiles the recommended methods and techniques for creating...
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory (Aruna Ravichandran, et al)
This book serves as a clear manual for building, implementing, measuring, and improving DevOps programs that are customized to the needs of the organizations of digital leaders who are...
TouchDevelop - Programming on the Go (R. Nigel Horspool, et al.)
The majority of people will soon possess and carry around mobile devices like smartphones and tablets as their primary PCs. However, not all computing functions are being performed on...
Learn BlackBerry 10 App Development: A Cascades-Driven Approach (Anwar Ludin)
Learn how to build powerful native applications using the BlackBerry 10 Cascades framework. It provides you with a strong basis for successfully creating BlackBerry 10 apps. ...

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments