Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) mobi 下载 网盘 caj lrf pdf txt 阿里云

Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745)电子书下载地址
- 文件名
- [epub 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) epub格式电子书
- [azw3 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) azw3格式电子书
- [pdf 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) pdf格式电子书
- [txt 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) txt格式电子书
- [mobi 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) mobi格式电子书
- [word 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) word格式电子书
- [kindle 下载] Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745) kindle格式电子书
内容简介:
The auditor's guide to ensuring correct security and
*** practices in a cloud computing environment
Many ***anizati*** are reporting or projecting a significant
cost savings through the use of cloud computing—utilizing shared
computing resources to provide ubiquitous access for ***anizati***
and end users. Just as many ***anizati***, however, are expressing
concern with security and *** issues for their ***anization's
data in the "cloud." Auditing Cloud Computing provides
necessary guidance to build a proper audit to ensure operational
integrity and customer data protection, among other ***ects, are
addressed for cloud based resources.
Provides necessary guidance to ensure auditors address security
and *** ***ects that through a proper audit can provide a
specified level of assurance for an ***anization's resources
Reveals effective methods for evaluating the security and
*** practices of cloud services
A cloud computing reference for auditors and IT security
professionals, as well as those preparing for certification
credentials, such as Certified Information Systems Auditor
(CISA)
Timely and practical, Auditing Cloud Computing expertly
provides information to assist in preparing for an audit addressing
cloud computing security and *** for both businesses and cloud
based service providers.
书籍目录:
Preface xiii
Chapter 1: Introduction to Cloud Computing
History
Defining Cloud Computing
Elasticity
Multitenancy
Economics
Abstraction
Cloud Computing Services Layers
Infrastructure as a Service
Platform as a Service
Software as a Service
Roles in Cloud Computing
C***umer
Provider
Integrator
Cloud Computing Deployment Models
Private
Community
Public
Hybrid
Challenges
Availability
Data Residency
Multitenancy
Performance
Data Evacuation
Supervisory Access
In Summary
Chapter 2: Cloud-Based IT Audit Process
The Audit Process
Control Frameworks for the Cloud
ENISA Cloud Risk Assessment
FedRAMP
Entities Using COBIT
CSA Guidance
CloudAudit/A6—The Automated Audit, Assertion, Assessment, and
Assurance API
Recommended Controls
Risk Management and Risk Assessment
Risk Management
Risk Assessment
Legal
In Summary
Chapter 3: Cloud-Based IT Governance
Governance in the Cloud
Understanding the Cloud
Security Issues in the Cloud
Abuse and Nefarious Use of Cloud Computing
Insecure Application Programming Interfaces
Malicious Insiders
Shared Technology Vulnerabilities
Data Loss/Leakage
Account, Service, and Traffic Hijacking
Unknown Risk Profile
Other Security Issues in the Cloud
Governance
IT Governance in the Cloud
Managing Service Agreements
Implementing and Maintaining Governance for Cloud Computing
Implementing Governance as a New Concept
Preliminary Tasks
Adopt a Governance Implementation Methodology
Extending IT Governance to the Cloud
In Summary
Chapter 4: System and Infrastructure Lifecycle Management for the
Cloud
Every Decision Involves Making a Tradeoff
Example: Business Continuity/Disaster Recovery
What about Policy and Process Collisi***?
The System and Management Lifecycle Onion
Mapping Control Methodologies onto the Cloud
Information Technology Infrastructure Library
Control Objectives for Information and Related Technology
National Institute of Standards and Technology
Cloud Security Alliance
Verifying Your Lifecycle Management
Always Start with Compliance Governance
Verification Method
Illustrative Example
Risk Tolerance
Special C***iderati*** for Cross-Cloud Deployments
The Cloud Provider’s Perspective
Questi*** That Matter
In Summary
Chapter 5: Cloud-Based IT Service Delivery and Support
Beyond Mere Migration
Architected to Share, Securely
Single-Tenant Offsite Operati***
(Managed Service Providers)
Isolated-Tenant Application Services
(Application Service Providers)
Multitenant (Cloud) Applicati*** and Platforms
Granular Privilege Assignment
Inherent Transaction Visibility
Centralized Community Creation
Coherent Customization
The Question of Location
Designed and Delivered for Trust
Fewer Points of Failure
Visibility and Transparency
In Summary
Chapter 6: Protection and Privacy of Information Assets in the
Cloud
The Three Usage Scenarios
What Is a Cloud? Establishing the Context—Defining Cloud
Soluti*** and their Characteristics
What Makes a Cloud Solution?
Understanding the Characteristics
Service Based
On-Demand Self-Service
Broad Network Access
Scalable and Elastic
Unpredictable Demand
Demand Servicing
Resource Pooling
Managed Shared Service
Auditability
Service Termination and Rollback
Charge by Quality of Service and Use
Capability to Monitor and Quantify Use
Monitor and Enforce Service Policies
Compensation for Location Independence
Multitenancy
Authentication and Authorization
Confidentiality
Integrity
Authenticity
Availability
Accounting and Control
Collaboration Oriented Architecture
Federated Access and ID Management
The Cloud Security Continuum and a Cloud Security Reference
Model
Cloud Characteristics, Data Classification, and Information
Lifecycle Management
Cloud Characteristics and Privacy and the Protection
of Information Assets
Information Asset Lifecycle and Cloud Models
Data Privacy in the Cloud
Data Classification in the Context of the Cloud
Regulatory and Compliance Implicati***
A Cloud Information Asset Protection and Privacy Playbook
In Summary
Chapter 7: Business Continuity and Disaster Recovery
Business Continuity Planning and Disaster Recovery
Planning Overview
Problem Statement
The Planning Process
The Auditor’s Role
Augmenting Traditional Disaster Recovery with Cloud Services
Cloud Computing and Disaster Recovery: New Issues to C***ider
Cloud Computing Continuity
Audit Points to Emphasize
In Summary
Chapter 8: Global Regulation and Cloud Computing
What is Regulation?
Federal Information Security Management Act
Sarbanes-Oxley Law
Health Information Privacy Accountability Act
Graham/Leach/Bliley Act
Privacy Laws
Why Do Regulati*** Occur?
Some Key Takeaways
The Real World—A Mixing Bowl
Some Key Takeaways
The Regulation Story
Privacy
International Export Law and Interoperable Compliance
Effective Audit
Identifying Risk
In Summary
Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing
Security and Audit
Where Is the Data?
A Shift in Thinking
Cloud Security Alliance
CloudAudit 1.0
Cloud Morphing Strategies
Virtual Security
Data in the Cloud
Cloud Storage
Database Classes in the Cloud
Perimeter Security
Cryptographic Protection of the Data
In Summary
Appendix: Cloud Computing Audit Checklist
About the Editor
About the Contributors
Index
作者介绍:
BEN HALPERT, CISSP, is an information security
researcher and practitioner. He has keynoted and presented sessi***
at numerous conferences and was a contributing author to
Readings and Cases in the Management of Information Security
and the Encyclopedia of Information Ethics and Security.
Halpert writes a monthly security column for Mobile Enterprise
magazine as well as an IT blog (www.benhalpert.com). He is also an
adjunct instructor and on the advisory board of numerous colleges
and universities.
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
书籍介绍
The auditor's guide to ensuring correct security and *** practices in a cloud computing environment Many ***anizati*** are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for ***anizati*** and end users. Just as many ***anizati***, however, are expressing concern with security and *** issues for their ***anization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other ***ects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and *** ***ects that through a proper audit can provide a specified level of assurance for an ***anization's resources Reveals effective methods for evaluating the security and *** practices of cloud services A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA) Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and *** for both businesses and cloud based service providers.
网站评分
书籍多样性:5分
书籍信息完全性:9分
网站更新速度:7分
使用便利性:9分
书籍清晰度:3分
书籍格式兼容性:8分
是否包含广告:9分
加载速度:5分
安全性:5分
稳定性:6分
搜索功能:6分
下载便捷性:5分
下载点评
- 三星好评(233+)
- 五星好评(133+)
- 图书多(226+)
- 赞(444+)
- 值得下载(553+)
- 还行吧(544+)
- 全格式(248+)
- 愉快的找书体验(165+)
- 内容齐全(190+)
- 章节完整(493+)
- 下载速度快(456+)
- 体验还行(662+)
- 可以购买(283+)
下载评价
- 网友 冉***兮:
如果满分一百分,我愿意给你99分,剩下一分怕你骄傲
- 网友 戈***玉:
特别棒
- 网友 寇***音:
好,真的挺使用的!
- 网友 步***青:
。。。。。好
- 网友 常***翠:
哈哈哈哈哈哈
- 网友 蓬***之:
好棒good
- 网友 寿***芳:
可以在线转化哦
- 网友 方***旋:
真的很好,里面很多小说都能搜到,但就是收费的太多了
- 网友 通***蕊:
五颗星、五颗星,大赞还觉得不错!~~
- 网友 师***怡:
说的好不如用的好,真心很好。越来越完美
- 网友 习***蓉:
品相完美
- 网友 屠***好:
还行吧。
- 网友 谭***然:
如果不要钱就好了
- 网友 马***偲:
好 很好 非常好 无比的好 史上最好的
- 网友 国***舒:
中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到
喜欢"Auditing Cloud Computing: A Security And Privacy Guide(I***N=9780470874745)"的人也看了
中国加入WTO要言释义 mobi 下载 网盘 caj lrf pdf txt 阿里云
科里尼案件(电影《无罪谋杀:科林尼案》原著小说) mobi 下载 网盘 caj lrf pdf txt 阿里云
二十四节气 彩图注音版 6-12岁传统文化故事书 小学生少儿百科全书课外阅读丛书 中国的星象文化 观星文化 mobi 下载 网盘 caj lrf pdf txt 阿里云
2023秋 万唯小白鸥情境题提思维 六年级上册 语文 人教 mobi 下载 网盘 caj lrf pdf txt 阿里云
一级建造师2019教材辅导冲刺试卷 2019版一级建造师考试用书公路工程管理与实务考前冲刺试卷 mobi 下载 网盘 caj lrf pdf txt 阿里云
绿色的革命 mobi 下载 网盘 caj lrf pdf txt 阿里云
转型期中国社会问题与化解 mobi 下载 网盘 caj lrf pdf txt 阿里云
英语阅读(二) mobi 下载 网盘 caj lrf pdf txt 阿里云
临床血液检验图谱与案例 mobi 下载 网盘 caj lrf pdf txt 阿里云
DK动物地图 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 全国专利代理师资格考试 相关法律知识 核心考点速记 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 军事检察学 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 学会复利成长,实现财务自由 mobi 下载 网盘 caj lrf pdf txt 阿里云
- MBA英语联考模拟试卷集解析 mobi 下载 网盘 caj lrf pdf txt 阿里云
- A MANAGER'S GUIDE TO STRATEGIC RETIREMENT PLAN MANAGEMENT 管理人用退休金计划管理战略指南 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 2011 新大纲 会计基础考点精讲与专家命题预测试卷(适用于无纸化考试) mobi 下载 网盘 caj lrf pdf txt 阿里云
- 2020国家***执业资格考试应试宝典(精练上执业资格考试规划教材)/国家执业资格考试应 mobi 下载 网盘 caj lrf pdf txt 阿里云
- Microsoft® Office Excel® 2007 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 圣才教育:2019年社会工作者社会工作实务(初级)过关必做1000题(含历年真题)(第7版) mobi 下载 网盘 caj lrf pdf txt 阿里云
- 儿童仰泳技术训练 mobi 下载 网盘 caj lrf pdf txt 阿里云
书籍真实打分
故事情节:3分
人物塑造:4分
主题深度:4分
文字风格:3分
语言运用:9分
文笔流畅:8分
思想传递:8分
知识深度:4分
知识广度:5分
实用性:7分
章节划分:6分
结构布局:8分
新颖与独特:5分
情感共鸣:3分
引人入胜:9分
现实相关:6分
沉浸感:5分
事实准确性:5分
文化贡献:5分