CSA Guide to Cloud Computing

Implementing Cloud Privacy and Security

By

  • Raj Samani, VP, CTO for McAfee EMEA; CLAS, CISSP, CEH, MCSE, CCSA, CCSE-NG, CCA, CCNA
  • Jim Reavis, Executive Director of CSA
  • Brian Honan, Information Systems Security Association

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).

For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents.

The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.

View full description

Audience

InfoSec professionals of all levels; systems architects; app developers; project managers; IT decision-makers; students studying information security and computer science.

 

Book information

  • Published: September 2014
  • Imprint: SYNGRESS
  • ISBN: 978-0-12-420125-5

Reviews

"...this book is one of the best ones I've ever read about migrating resources to the cloud. With the resources and knowledge of the Cloud Security Alliance as a basis, this should not come as a surprise."--Help Net Security,December 10,2014




Table of Contents

Cloud Computing: What Is it, and What's the Big Deal?
Selecting and Engaging with a Cloud Service Provider
Mobile Solutions and the Cloud Security Imperative
Big Data and the Cloud
Certification and Standards
Real-Time Assurance
The Threat Landscape
Security Considerations for the Cloud
The Privacy Imperative
Compliance and Regulatory Issues
Dark Clouds: What to Do in the Event of a Security Incident