Risk-Based Approach to Secure Cloud Migration

Risk-Based Approach to Secure Cloud Migration

Minakshi ., Tarun Kumar
Pages: 300
DOI: 10.4018/979-8-3693-7137-4
ISBN13: 9798369371374|ISBN13 Softcover: 9798369371381|EISBN13: 9798369371398
Hardcover:
Forthcoming
$315.00
TOTAL SAVINGS: $315.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Forthcoming
$315.00
TOTAL SAVINGS: $315.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Forthcoming
$315.00
TOTAL SAVINGS: $315.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Forthcoming
$315.00
TOTAL SAVINGS: $315.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Forthcoming
$380.00
TOTAL SAVINGS: $380.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Forthcoming
$380.00
TOTAL SAVINGS: $380.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Forthcoming
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Forthcoming
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
Forthcoming
$1,950.00
TOTAL SAVINGS: $1,950.00
Description & Coverage
Description:

This publication presents a detailed overview of cloud security, describing the fundamental approaches, methods, and tools for safeguarding data, applications, and infrastructure in cloud computing. It will discuss the specific threats and vulnerabilities that arise from cloud implementation, including data breaches, information disclosure, regulatory violations, and potential cyberattacks. The book will explain the primary cloud security frameworks, service models, access control methods, encryption algorithms, and security monitoring technologies. It will also mention best practices for secure cloud migration, incident response, and business continuity. Throughout the publication, several case studies and examples will illustrate the practical implementation of cloud security in various business fields and organizational structures.

This publication substantially impacts the research community by laying the groundwork for further research and development in the area of cloud security. It will become an essential reference source for scholars, practitioners, and students working on cloud computing, IT security, and related areas. It will provide a reliable source of knowledge for further exploration and experimentation in cloud security due to the extensive coverage of the latest trends and challenges in cloud security. This publication will promote partnerships and networking amongst researchers, facilitating the dissemination of unique concepts and the development of innovative cloud security solutions.

Coverage:
Coverage forthcoming
Table of Contents
Search this Book:
Reset
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.