Now Australia's Biggest Toy Store

Shop over 1.5 Million Toys in our Huge New Range

Securing Cloud and Mobility

Product Details

Table of Contents

RETHINKING IT AND SECURITY Tectonic Shifts Disruptive Forces Deconstructing Cloud Computing NIST Definition The Three Service Models The Four Deployment Models The Rise of Mobility New IT References The Evolving Threat Landscape From Cryptographers to World Leaders The Changing Threat Landscape Hacktivists Motivation Modus Operandi Hacktivism and Cloud Hacktivism and Mobility Hacktivism and Security Organized Cyber Crime Motivation Modus Operandi Organized Crime and Cloud Organized Crime and Mobility Organized Crime and Security Cyber Espionage and Terrorism Motivation Modus Operandi Cyber Espionage, Terrorism, and Cloud Cyber Espionage, Terrorism, and Mobility Cyber Espionage, Terrorism, and Security Hackers for Hire Motivation and Modus Operandi Hackers for Hire and the Cloud Hackers for Hire and Mobility Hackers for Hire and Security Insider Threat References DECONSTRUCTING CLOUD SECURITY The Cloud Dialogues The Point of Cloud Capability Financials Agility Security Licensing Service Level Agreements References SECURING PRIVATE CLOUD COMPUTING Segmentation and the Private Cloud Physical and Logical Segmentation Physical Segmentation Physical and Virtual Segmentation Highly Optimized Segmentation Model Production-Based Segmentation Model Storage Segmentation Model Orchestration and Cloud Management What Is Orchestration? Benefits and Challenges Information Security Considerations Secure Service Delivery Workflows Secure Resource Delivery Automation Secure Orchestration Management Security Monitoring Encryption Services Holistic Encryption Strategy Scope Reduction Transport Layer Encryption Secure Socket Layer (SSL) Virtual Private Networks (VPNs) Secure Shell (SSH) Secure File Transfer Protocol (SFTP) Transport Layer Security (TLS) Data Layer Encryption Database Encryption File Encryption Encryption Appliances Disk Encryption Virtualization Encryption Key Management Life Cycle References Threat Intelligence Security Threats to Private Cloud Threat Prevention Strategies Threat Detection Toolset Making Threat Detection Intelligent Identity Management for Private Clouds Layers of Identities Challenges of Disparate Identity Repositories Centralizing Identity Repositories Entitlements Aggregator Authoritative Sources of Identities Administrative Access Task User Access Central Identity Repository SECURING PUBLIC CLOUDS Enterprise Cloud Governance Security Exposure of Public Cloud Use Corporate Cloud Use Policy Cloud Request Form Cloud Approval Workflow References The Cursory Cloud Use Review Overview Interview with Cloud Service Provider Cursory Review-Assessment Report In-Depth Cloud Assessment Overview Interview with the Requestor Security Governance Data Protection Overview Data Protection Questions for All Service Models SaaS Data Protection Questions PaaS Data Protection Questions IaaS Data Protection Questions Security Architecture Application Security Overview SaaS Application Security PaaS Application Security Identity and Access Management Overview Identity Access Management for CSP Staff Identity and Access Management for CSP Customers Compliance Electronic Discovery Closing the Loop References Third-Party Cloud Assessment Overview Selecting an Assessor Finalizing the SOW Closing the Loop SECURING MOBILE Mobile Security Infrastructure Overview BlackBerry (R) Enterprise Server Architecture Exchange to Support iOS, Android (TM), and Windows (R) Phone References The Mobile Client Itself Overview Tablet and Smart Phone Security Issues Bring Your Own Device (BYOD) Lack of Encryption Lack of Good Authentication and Password Controls Unfiltered Mobile Apps Saying No Is a Tricky Business Updating Mobile Standards and Searching for Solutions Performing Sanity Testing Garnering Executive Support and the Big Win References Connecting to Enterprise and Third-Party Applications from Mobile Devices Overview Connecting to Exchange Connecting via VPN Connecting to Microsoft SharePoint (R) 2010 or Later Connecting to a Desktop or Server Connecting to File Shares Connecting to or Installing Third-Party Applications References Creating Secure Mobile Applications Mobile Application Development in Your Organization Start with the Stakeholders Step through the Entire SDLC Guidelines Regarding Enterprise App Store/Google (R) Play Overview of Infrastructure Overview of Environment Setup and General Controls A Note about Publishing Your Apps Dealing with the Apple (R) App Store Dealing with Android's Google Play References Index

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Securing Cloud and Mobility: A Practitioner's Guide on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top