All
All

'Cloud Security' Excerpt

861 KB | 3 files | null PDF,null DOC

With the openness of Cloud Computing, security can't be an afterthought-it has to be built into the DNA of cloud applications from the outset. This book chapter covers the basics, whether your shop or a vendor is doing the coding.

In "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," authors and security experts Ronald L. Krutz and Russell Dean Vines take a look at the advantages of cloud computing while outlining the security risks presented by these services.

Our excerpt comes from the first chapter, entitled "Cloud Computing Software Security Fundamentals." This chapter emphasizes the importance of building security measures into the software development life cycle for cloud computing, whether code is being created by the cloud provider or the customer.

Reprinted with permission of John Wiley & Sons, Inc., from Ronald L. Krutz and Russell Dean Vines' "Cloud Security: A Comprehensive Guide to Secure Cloud Computing," 2010.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Cloud Security Excerpt.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Wiley is a global publisher of print and electronic products, specializing in scientific, technical, medical and scholarly journals, encyclopedias, books, and online products and services; professional/trade books, subscription products, training materials, and online applications and websites; and educational materials for undergraduate and graduate students and lifelong learners.

All IT Downloads from John Wiley & Sons, Inc.» | Visit John Wiley & Sons, Inc. »
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.