'Cloud Security' Excerpt

861 KB | 3 files |  PDF, DOC

With the openness of Cloud Computing, security can't be an afterthought-it has to be built into the DNA of cloud applications from the outset. This book chapter covers the basics, whether your shop or a vendor is doing the coding.

In "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," authors and security experts Ronald L. Krutz and Russell Dean Vines take a look at the advantages of cloud computing while outlining the security risks presented by these services.

Our excerpt comes from the first chapter, entitled "Cloud Computing Software Security Fundamentals." This chapter emphasizes the importance of building security measures into the software development life cycle for cloud computing, whether code is being created by the cloud provider or the customer.

Reprinted with permission of John Wiley & Sons, Inc., from Ronald L. Krutz and Russell Dean Vines' "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," 2010.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Cloud Security Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »
Related IT Downloads

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.