|
Showing 1 - 4 of
4 matches in All Departments
Although virtualization is a widely accepted technology, there are
few books dedicated to virtualization and security. Filling this
need, Securing Cloud and Mobility: A Practitioner's Guide explains
how to secure the multifaceted layers of private and public cloud
deployments as well as mobility infrastructures. With comprehensive
coverage that includes network, server, and endpoint security, it
provides a strategic view of the security implications of
virtualization and cloud computing. The book begins by
deconstructing the terminology of cloud computing. It explains how
to establish a secure framework within the virtualized environment
and breaks down the various deployment and service models for cloud
computing. For private clouds, it discusses the issues of physical
versus logical segmentation, securing orchestration, encryption
services, threat intelligence, and identity management. For public
clouds, it provides three frameworks for reviewing cloud services:
cursory, in-depth, and outsourced. On the mobility side, the text
discusses the three major mobile architectures: Apple IOS, Android,
and Blackberry. Filled with real-world examples, it addresses the
various mobile management approaches, secure mobile code
development and standards, and the emerging threats to both cloud
and mobility. Laying out decision-making frameworks to help you
secure your virtual environment, the book includes coverage of
physical and virtual segregation, orchestration security, threat
intelligence, identity management, cloud security assessments,
cloud encryption services, audit and compliance, certifications,
and secure mobile architecture. It includes helpful implementation
considerations, technical decision points, and process flows to
supply you with practical guidance on how to navigate the
undulating terrains of cloud and mobility.
While information security is an ever-present challenge for all
types of organizations today, most focus on providing security
without addressing the necessities of staff, time, or budget in a
practical manner. Information Security Cost Management offers a
pragmatic approach to implementing information security, taking
budgetary and real-world constraints into consideration. By
providing frameworks, step-by-step processes, and project
management breakdowns, this book demonstrates how to design the
best security strategy with the resources you have available.
Organized into five sections, the book- Focuses on setting the
right road map so that you can be most effective in your
information security implementations Discusses cost-effective
staffing, the single biggest expense to the security organization
Presents practical ways to build and manage the documentation that
details strategy, provides resources for operating annual audits,
and illustrates how to advertise accomplishments to senior
management effectively Identifies high-risk areas, focusing limited
resources on the most imminent and severe threats Describes how to
manage the key access controls when faced with manual user
management, how to automate user management tasks in a cost
effective manner, and how to deal with security breaches
Demonstrating strategies to maximize a limited security budget
without compromising the quality of risk management initiatives,
Information Security Cost Management helps you save your
organization time and money. It provides the tools required to
implement policies, processes, and training that are crucial to the
success of a company's security.
While information security is an ever-present challenge for all
types of organizations today, most focus on providing security
without addressing the necessities of staff, time, or budget in a
practical manner. Information Security Cost Management offers a
pragmatic approach to implementing information security, taking
budgetary and real-world constraints into consideration. By
providing frameworks, step-by-step processes, and project
management breakdowns, this book demonstrates how to design the
best security strategy with the resources you have available.
Organized into five sections, the book- -Focuses on setting the
right road map so that you can be most effective in your
information security implementations -Discusses cost-effective
staffing, the single biggest expense to the security organization
-Presents practical ways to build and manage the documentation that
details strategy, provides resources for operating annual audits,
and illustrates how to advertise accomplishments to senior
management effectively -Identifies high-risk areas, focusing
limited resources on the most imminent and severe threats
-Describes how to manage the key access controls when faced with
manual user management, how to automate user management tasks in a
cost effective manner, and how to deal with security breaches
Demonstrating strategies to maximize a limited security budget
without compromising the quality of risk management initiatives,
Information Security Cost Management helps you save your
organization time and money. It provides the tools required to
implement policies, processes, and training that are crucial to the
success of a company's security.
Although virtualization is a widely accepted technology, there are
few books dedicated to virtualization and security. Filling this
need, Securing Cloud and Mobility: A Practitioner's Guide explains
how to secure the multifaceted layers of private and public cloud
deployments as well as mobility infrastructures. With comprehensive
coverage that includes network, server, and endpoint security, it
provides a strategic view of the security implications of
virtualization and cloud computing. The book begins by
deconstructing the terminology of cloud computing. It explains how
to establish a secure framework within the virtualized environment
and breaks down the various deployment and service models for cloud
computing. For private clouds, it discusses the issues of physical
versus logical segmentation, securing orchestration, encryption
services, threat intelligence, and identity management. For public
clouds, it provides three frameworks for reviewing cloud services:
cursory, in-depth, and outsourced. On the mobility side, the text
discusses the three major mobile architectures: Apple IOS, Android,
and Blackberry. Filled with real-world examples, it addresses the
various mobile management approaches, secure mobile code
development and standards, and the emerging threats to both cloud
and mobility. Laying out decision-making frameworks to help you
secure your virtual environment, the book includes coverage of
physical and virtual segregation, orchestration security, threat
intelligence, identity management, cloud security assessments,
cloud encryption services, audit and compliance, certifications,
and secure mobile architecture. It includes helpful implementation
considerations, technical decision points, and process flows to
supply you with practical guidance on how to navigate the
undulating terrains of cloud and mobility.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|