Building the Infrastructure for Cloud Security



Download free course Building the Infrastructure for Cloud Security, pdf file on 240 pages by by Raghu Yeluri, Enrique Castro-Leon.
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical.

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

Table of contents

  • Cloud Computing Basics
  • The Trusted Cloud: Addressing Security and Compliance
  • Platform Boot Integrity: Foundation for Trusted Compute Pools
  • Attestation: Proving Trustability
  • Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
  • Network Security in the Cloud
  • Identity Management and Control for Clouds
  • Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
  • A Reference Design for Secure Cloud Bursting
Pages : 240
Size : 8.6 MB
File type : PDF
Downloads: 100
Created: 2022-02-01
License: CC BY-NC-ND
Author(s): by Raghu Yeluri, Enrique Castro-Leon
Building the Infrastructure for Cloud Security

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others security Tutorials

Building the Infrastructure for Cloud Security

Intrusion Detection Systems with Snort

Platform Embedded Security Technology Revealed

Security in Computer and Information Sciences

Guide to Computer Network Security, 4th Edition

Others related eBooks about Building the Infrastructure for Cloud Security

Voice over IP overview in pdf

Download free training tutorial in pdf about VoIP (Voice over IP),document in 46 pages designated to intermediate level-users....

Full Listing of Port Numbers

You will find in this document a complete list of TCP and UDP ports with their descriptions, free pdf file in 13 pages for downloading....

Virtual Private Networks free tutorial

Download free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....

Networking Technologies

Download free Netwoking technologies tutorial , course tutorial training on pdf under 222 pages by Raleigh Center....

Demystifying Internet of Things Security

Download free course Demystifying Internet of Things Security, pdf file on 488 pages by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler....

Cisco ACE to Nginx

Download free course Cisco ACE to Nginx, pdf file on 51 pages by Faisal Memon....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Download free eBook about Network cryptography and Nmap, Secrets of Network Cartography: A Comprehensive Guide to Nmap....

Introduction to Ethical Hacking

Download Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....

Network Protocols and Vulnerabilities

This tutorial is about the network security and how they are not perfect ,it decribe some of attacks and how to protect against them....

Computer Networks: A Systems Approach

This book explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best selling and classic textbook explains various protocols and networking technologies. The systems oriented appro...