ABSTRACT
A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture and secure mobile coding standards.
TABLE OF CONTENTS
part I|2 pages
Rethinking IT and Security
part II|2 pages
Deconstructing Cloud Security
part III|2 pages
Securing Private Cloud Computing
part IV|2 pages
Securing Public Clouds
part V|2 pages
Securing Mobile