Building the Infrastructure for Cloud Security -  Enrique Castro-Leon,  Raghuram Yeluri

Building the Infrastructure for Cloud Security (eBook)

A Solutions View
eBook Download: EPUB
2014 | 1st ed.
XXVI, 244 Seiten
Apress (Verlag)
978-1-4302-6146-9 (ISBN)
Systemvoraussetzungen
3,84 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations."e;A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!"e; —Vince Lubsey, Vice President, Product Development, Virtustream Inc."e; Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles."e; —John Skinner, Vice President, HyTrust Inc."e;Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud."e; —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

Raghu Yeluri is a Principal Engineer and lead Security Solutions Architect in the Data Center & Cloud Products Group at Intel Corporation with focus on virtualization and cloud security usages, solution architectures and technology initiatives. In this role, he drives security solution Pathfinding and development to deliver hardware-assisted security solutions that enable deep visibility, orchestration and control in multi-tenant Clouds. Prior to this role, he has worked in various engineering and architecture positions in systems development and deployment, focusing on service-oriented architectures and large data analytics, in Information Technology and Manufacturing Technology groups during the last 15+ years at Intel. Raghu has multiple patents filed in security, attestation and control in virtualization and cloud computing, and he is a co-author of a book, Creating the Infrastructure for Cloud Computing: An Essential Handbook for IT Professionals. He holds a MS degree in Computer Science, and a B.S in Electrical Engineering, and was involved in multiple Artificial Intelligence/Knowledge-Engineering startup ventures, prior to joining Intel.

Chapter 1: Cloud Computing BasicsChapter 2: The Trusted Cloud: Addressing Security and ComplianceChapter 3: Platform Boot Integrity: Foundation for Trusted Compute PoolsChapter 4: Attestation: Proving TrustabilityChapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset TaggingChapter 6: Network Security in the CloudChapter 7: Identity Management and Control for CloudsChapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud Chapter 9: A Reference Design for Secure Cloud Bursting

Erscheint lt. Verlag 29.3.2014
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 1-4302-6146-3 / 1430261463
ISBN-13 978-1-4302-6146-9 / 9781430261469
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99