- Full Description
The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure.
This book provides a comprehensive look at the various facets of Cloud Security infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a Security perspective.
What youll learn
- Through case studies you will see end-to-end cloud security infrastructure solutions
- Using CloudBuilder to build working solutions
Who this book is for
This book will influence Infrastructure, Application and solution architects along with CTOs and CIOs and make them aware of Cloud Security and how to approach it with real-world examples and case studies.
- Table of Contents
Table of Contents
Chapter 1: Cloud Computing Basics
Chapter 2: The Trusted Cloud: Addressing Security and Compliance
Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools
Chapter 4: Attestation: Proving Trustability
Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
Chapter 6: Network Security in the Cloud
Chapter 7: Identity Management and Control for Clouds
Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
Chapter 9: A Reference Design for Secure Cloud Bursting
If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.No errata are currently published