Building the Infrastructure for Cloud Security: A Solutions View (Record no. 68335)

MARC details
000 -LEADER
fixed length control field 02350naaaa2200277uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/42527
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220220053808.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number /doi.org/10.1007/978-1-4302-6146-9
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430261452
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781430261469
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code https://doi.org/10.1007/978-1-4302-6146-9
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Raghuram Yeluri
Relationship auth
245 10 - TITLE STATEMENT
Title Building the Infrastructure for Cloud Security: A Solutions View
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (244 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.
536 ## - FUNDING INFORMATION NOTE
Text of note Intel
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by-nc-nd/4.0/
Source of term cc
-- https://creativecommons.org/licenses/by-nc-nd/4.0/
546 ## - LANGUAGE NOTE
Language note English
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Enrique Castro-Leon
Relationship auth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://link.springer.com/book/10.1007/978-1-4302-6146-9">https://link.springer.com/book/10.1007/978-1-4302-6146-9</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/42527">https://directory.doabooks.org/handle/20.500.12854/42527</a>
Access status 0
Public note DOAB: description of the publication

No items available.