Securing the Cloud

1st Edition

Cloud Computer Security Techniques and Tactics

Authors: Vic (J.R.) Winkler
Paperback ISBN: 9781597495929
eBook ISBN: 9781597495936
Imprint: Syngress
Published Date: 29th April 2011
Page Count: 314
37.95 + applicable tax
29.99 + applicable tax
59.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security—resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.

Key Features

  • Named The 2011 Best Identity Management Book by InfoSec Reviews
  • Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust
  • Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery
  • Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage


Network and Security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.

Table of Contents



About the Author

About the Technical Editor


Chapter 1. Introduction to Cloud Computing and Security

Chapter 2. Cloud Computing Architecture

Chapter 3. Security Concerns, Risk Issues, and Legal Aspects

Chapter 4. Securing the Cloud: Architecture

Chapter 5. Securing the Cloud: Data Security

Chapter 6. Securing the Cloud: Key Strategies and Best Practices

Chapter 7. Security Criteria: Building an Internal Cloud

Chapter 8. Security Criteria: Selecting an External Cloud Provider

Chapter 9. Evaluating Cloud Security: An Information Security Framework

Chapter 10. Operating a Cloud



No. of pages:
© Syngress 2011
eBook ISBN:
Paperback ISBN:

About the Author

Vic (J.R.) Winkler

Vic (J.R.) Winkler is a Senior Associate at Booz Allen Hamilton, providing technical consultation to U.S. Government clients. He is a published InfoSec and cyber security researcher as well as an expert in intrusion/anomaly detection.

Affiliations and Expertise

Vic (J.R.) Winkler is a Senior Associate at Booz Allen Hamilton, providing technical consultation to U.S. Government clients. He is a published InfoSec and cyber security researcher as well as an expert in intrusion/anomaly detection.


First - Best Identity Management Books 2011, InfoSec Reviews


"With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information  jam packed almost 300 page volume on securing the cloud. As a former pre-sales engineer, what I loved most about this book was the obvious hands-on strategic and technical experience that Winkler bought to every aspect of it. It is really a practitioner’s guide to cloud computing security. I appreciated the descriptive figures, the tips, the warnings, the notes, the tools, the stories of failures and successes but most of all the comprehensive nature of the real world descriptions."--Computers & Security

"Securing the Cloud is the most useful and informative of all the books published to date on cloud security. If you are going to procure a cloud solution, or are already operating a cloud system, I would strongly recommend that you buy a copy."--Best Identity Management Book by InfoSecReviews Book Awards

"The author states this book will be a practical resource for anyone who is considering using, building or securing a cloud implementation, including infrastructure engineers, integrators, security architects, right up to execute-level management. The challenge with such a broad audience is pitching the text at the right level; I suspect some security professionals and executives may find the book far too detailed …. In the final chapter the author covers the operational aspects of managing a secure cloud. Overall a fairly technical but effective book, although perhaps a little too in-depth for execute-level management"

"Overall, this book is effective in delivering its message. However, it is very technical in nature; readers should be aware that it is more than a basic level text for understanding t