Building the Infrastructure for Cloud Security



Download free course Building the Infrastructure for Cloud Security, pdf file on 240 pages by by Raghu Yeluri, Enrique Castro-Leon.
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical.

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

Table of contents

  • Cloud Computing Basics
  • The Trusted Cloud: Addressing Security and Compliance
  • Platform Boot Integrity: Foundation for Trusted Compute Pools
  • Attestation: Proving Trustability
  • Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
  • Network Security in the Cloud
  • Identity Management and Control for Clouds
  • Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
  • A Reference Design for Secure Cloud Bursting
Pages : 240
Size : 8.6 MB
File type : PDF
Downloads: 108
Created: 2022-02-01
License: CC BY-NC-ND
Author(s): by Raghu Yeluri, Enrique Castro-Leon
Building the Infrastructure for Cloud Security

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others security Tutorials

Rational Cybersecurity for Business

Intrusion Detection Systems with Snort

Managing Risk and Information Security

Security Infrastructure Technology for Integrated Utilization of Big Data

Demystifying Internet of Things Security

Others related eBooks about Building the Infrastructure for Cloud Security

IP Network Architecture

Download free pdf course training material about IP Network Architecture and IP addresses ,document by Kurtis and woody on 74 pages for intermediate level students....

Natural Language Processing Succinctly

Download free course Natural Language Processing Succinctly, pdf file on 93 pages by Joseph D. Booth....

Network Protocols and Vulnerabilities

This tutorial is about the network security and how they are not perfect ,it decribe some of attacks and how to protect against them....

Demystifying Internet of Things Security

Download free course Demystifying Internet of Things Security, pdf file on 488 pages by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler....

Platform Embedded Security Technology Revealed

Download free course Platform Embedded Security Technology Revealed, pdf file on 263 pages by Xiaoyu Ruan....

Computer Networking : Principles, Protocols and Practice

This is an ongoing effort to develop an open-source networking textbook that could be used for an in-depth undergraduate or graduate networking courses. ...

Firewall security

Download free Firewall Tutorial course material, tutorial training, PDF file by Cisco Systems on 21 pages....

Configuring VoIP Call Setup Monitoring

Download tutorial about configuring VoIP call and setup monitoring, it's a free training document material in 14 pages by Scisco designated to intermediate level users....

Secrets of Network Cartography: A Comprehensive Guide to Nmap

Ever wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...

Windows PowerShell Networking Guide

Download free course Windows PowerShell Networking Guide, pdf file on 74 pages by Ed Wilson....