CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security
- Length: 236 pages
- Edition: 1
- Language: English
- Publisher: Syngress
- Publication Date: 2014-10-08
- ISBN-10: 0124201253
- ISBN-13: 9780124201255
- Sales Rank: #1229094 (See Top 100 Books)
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).
For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents.
The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won’t find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.
- Your one-stop source for comprehensive understanding of cloud security from the foremost thought leaders in the industry
- Insight into the most current research on cloud privacy and security, compiling information from CSA’s global membership
- Analysis of future security and privacy issues that will impact any enterprise that uses cloud computing
Table of Contents
Chapter 1. Cloud Computing: What Is it, and What’s the Big Deal?
Chapter 2. Selecting and Engaging with a Cloud Service Provider
Chapter 3. The Cloud Threat Landscape
Chapter 4. Secure Cloud for Mobile Computing
Chapter 5. Making the Move into the Cloud
Chapter 6. Certifcation for Cloud Service Providers
Chapter 7. The Privacy Imperative
Chapter 8. Cloud Security Alliance Research
Chapter 9. Dark Clouds, What to Do In The Event of a Security Incident
Chapter 10. The Future Cloud