<i>Cloud Storage Security: A Practical Guide</i>introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also pr
Cloud storage security : a practical guide
β Scribed by Wheeler, Aaron; Winburn, Michael
- Publisher
- Elsevier
- Year
- 2015
- Tongue
- English
- Leaves
- 139
- Series
- Computer science reviews and trends
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
- Describes the history and the evolving nature of cloud storage and security
- Explores the threats to privacy and security when using free social media applications that use cloud storage
- Covers legal issues and laws that govern privacy, compliance, and legal responsibility for enterprise users
- Provides guidelines and a security checklist for selecting a cloud-storage service provider
- Includes case studies and best practices for securing data in the cloud
- Discusses the future of cloud computing
β¦ Table of Contents
Content:
Front-matter,CopyrightEntitled to full textChapter 1 - Data in the Cloud, Pages 1-22
Chapter 2 - Application Data in the Cloud, Pages 23-55
Chapter 3 - Privacy Challenges, Pages 57-74
Chapter 4 - Compliance, Pages 75-98
Chapter 5 - Privacy Tools, Pages 99-112
Chapter 6 - Best Practices, Pages 113-123
Chapter 7 - The Future of Cloud Data Privacy and Security, Pages 125-138
π SIMILAR VOLUMES
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects
Intro; Copyright; Table of Contents; Preface; Conventions Used in This Book; O'Reilly Online Learning Platform; How to Contact Us; Acknowledgments; Chapter 1. Principles and Concepts; Least Privilege; Defense in Depth; Threat Actors, Diagrams, and Trust Boundaries; Cloud Delivery Models; The Cloud S
<span>With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises proje
1 online resource (1 volume) :