The book begins by deconstructing the terminology of cloud computing. It explains how to establish a secure framework within the virtualized environment and breaks down the various deployment and service models for cloud computing. For private clouds, it discusses the issues of physical versus logical segmentation, securing orchestration, encryption services, threat intelligence, and identity management. For public clouds, it provides three frameworks for reviewing cloud services: cursory, in-depth, and outsourced.
Table of Contents
Part I. Rethinking IT and Security Chapter 1. Tectonic Shifts Chapter 2. The Evolving Threat Landscape Part II. Deconstructing Cloud Security Chapter 3. Cloud Dialogues Chapter 4. Segmentation and the Private Cloud Part III. Securing Private Cloud Computing Chapter 5. Orchestration and Cloud Management Chapter 6. Encryption Services Chapter 7. Threat Intelligence Chapter 8. Identity Management for Private Clouds Part IV. Securing Public Clouds Chapter 9. Enterprise Cloud Governance Chapter 10. Cursory Cloud Use Review Chapter 11. In-Depth Cloud Assessment Chapter 12. Third-Party Cloud Assessment Part V. Securing Mobile Chapter 13. Mobile Security Infrastructure Chapter 14. The Mobile Client Itself Chapter 15. Connecting to Enterprise and Third-Party Applications from Mobile Devices Chapter 16. Creating Secure Mobile Applications
Securing Cloud and Mobility: A Practitioner’s Guide - At our site you can freely choose the books that you love and read it, but did you know that in order to write the book so interesting and useful to the reader, the author takes lots of energy and enthusiasm for it, so you stop the download and give a small amount to contribute to support the author, can help them write many more great books for you. Thanks you very much.