Building the Infrastructure for Cloud Security



Download free course Building the Infrastructure for Cloud Security, pdf file on 240 pages by by Raghu Yeluri, Enrique Castro-Leon.
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical.

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

Table of contents

  • Cloud Computing Basics
  • The Trusted Cloud: Addressing Security and Compliance
  • Platform Boot Integrity: Foundation for Trusted Compute Pools
  • Attestation: Proving Trustability
  • Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
  • Network Security in the Cloud
  • Identity Management and Control for Clouds
  • Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
  • A Reference Design for Secure Cloud Bursting
Pages : 240
Size : 8.6 MB
File type : PDF
Downloads: 111
Created: 2022-02-01
License: CC BY-NC-ND
Author(s): by Raghu Yeluri, Enrique Castro-Leon
Building the Infrastructure for Cloud Security

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others security Tutorials

Denial of service attacks and network defense

Security in Computer and Information Sciences

Demystifying Internet of Things Security

Rational Cybersecurity for Business

Intrusion Detection Systems with Snort

Others related eBooks about Building the Infrastructure for Cloud Security

Guide to Computer Network Security

Download free course Guide to Computer Network Security, pdf file on 572 pages by Joseph Migga Kizza....

Managing Risk and Information Security

Download free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....

Spatial Thinking in Planning Practice

Download free course Spatial Thinking in Planning Practice, pdf file on 61 pages by Yiping Fang, Vivek Shandas, Eugenio Arriaga....

Planning and Preparing for Microsoft SharePoint Hybrid

Download free course Planning and Preparing for Microsoft SharePoint Hybrid, pdf file on 113 pages by Jeremy Taylor....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...

Networking with the Micro:bit

Download free course Networking with the Micro:bit, pdf file on 73 pages by Cigdem Sengul, Anthony Kir....

Introduction to Ethical Hacking

Download Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....

Why Should I Care? Mobile Security for The Rest of Us

Download free course Why Should I Care? Mobile Security for The Rest of Us, pdf file on 46 pages by Veracode....

The Security Development Lifecycle

Download free course The Security Development Lifecycle, pdf file on 348 pages by Michael Howard, Steve Lipner....

VoIP Tutorial in PDF

This pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....