Above the Clouds : Managing Risk in the World of Cloud Computing.

By: McDonald, Kevin TPublisher: Cambs : IT Governance Ltd, 2010Copyright date: ©2010Edition: 1st edDescription: 1 online resource (166 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781849280327Subject(s): Veterinaria -- Artículos -- Publicaciones periódicas.;Perros.;Veterinary medicine -- Periodicals.;Dogs.;Articulos -- Publicaciones periodicas;Libros electronicosGenre/Form: Electronic books. Additional physical formats: Print version:: Above the Clouds : Managing Risk in the World of Cloud ComputingDDC classification: 658.05 LOC classification: TK5105.88813 -- .M33 2010ebOnline resources: Click to View
Contents:
Intro -- PREFACE -- What is Cloud Computing? -- Shared service model -- Computing as a commodity service -- Simplicity versus complexity -- Data center efficiency -- The way ahead -- ABOUT THE AUTHOR -- ACKNOWLEDGEMENTS -- CONTENTS -- INTRODUCTION -- Virtualization -- Time slice -- Hypervisor -- Public, private, community and hybrid Clouds -- SaaS, IaaS and PaaS -- Disruptive technology -- Trusting the Cloud: stop, go or caution -- CHAPTER 1: SETTING COURSE TO THE CLOUDS -- Renting versus owning infrastructure -- Scalability -- The larger they are, the less likely they are to fall -- Going virtual -- Cloud platforms and rapid system prototyping -- Consolidating low-use applications -- Patch management services -- Cloud backup -- Cloud bursting: surge capacity -- Desktop office suites -- Symphony -- Zoho Office for SharePoint® -- Google™ Docs -- Crowdsourcing and social networking -- The operating system -- Green computing: power and the grid -- Major benefits of Cloud Computing -- Core competencies of the data center staff -- Increased utilization -- 24/7 watch centers -- Enhanced recovery through server and data replication -- Free staff time -- Capital expenses replaced with operational expenses -- External certification and quality of service -- CHAPTER 2: PREFLIGHT CHECK -- Computing as a utility -- Elasticity -- Capacity requirements -- Baseline service levels -- In-sourcing -- Targeting legacy systems -- Planning for staff transition -- Avoiding self-inflicted wounds -- Economies of scale -- Bigger pipes are better -- Moving big iron (mainframes) to the Clouds -- Storage in the Cloud -- Bandwidth and try it before you buy it -- Instant test beds -- Reduce the scope of the implementation -- Pod computing reduces configuration time -- Project management versus ad hoc -- Elasticity reduces need for capacity planning -- Calculating cost benefit.
CHAPTER 3: TAXI RUNWAY -- Start-up risks -- Choosing a service provider -- Types of Cloud services -- Risk assessment and gap analysis -- Certifications - caveat emptor, let the buyer beware! -- Measuring service levels -- Latency -- User expectations and response time -- Culture of compliance -- Early adoption techniques -- Human resources and background checks -- Infrastructure -- Multi-tenancy -- Avoiding miscommunication with the service provider -- Reduce the risk by converting only new applications -- Have an exit strategy -- One size does not fit all -- People again -- Disaster recovery and business continuity planning -- Depth on the bench -- Separation of duties and need to know -- Financial health of the service provider -- Financial risk -- CHAPTER 4: TOWER CLEARANCE -- Organizational impact: what would happen if? -- Mitigation strategies: what can we do to lessen impact? -- Continuity plans: keep going if the worst happens -- External versus internal hosting providers -- Strategies for managing change -- Break the project into smaller parts for pilot projects -- Progressive elaboration -- Testing -- Certification of data centers -- Pick on the little guy -- Continuity of operations planning -- Protecting data with encryption -- Unencrypted data protection -- Data loss prevention -- Stay in touch with the Cloud! -- People, process, and then technology -- Certifications matter -- CHAPTER 5: SECURING THE CABIN -- Recognize the risk in order to avoid the consequences -- Defense in depth strategies -- Cloud security operation centers -- User provisioning -- Security and authentication in the Cloud -- CHAPTER 6: TAKE OFF -- If it's on the Internet, it belongs in the Cloud -- E-mail in the Clouds -- Linking to expertise -- Case study: backup and recovery centers -- Case study: primary data centers -- Reducing the noise.
Attack surfaces multiply -- Security in the Cloud -- Server logs -- Linking systems dynamically -- Mashups -- Privacy versus security -- Organizing the Cloud environment -- The portal model -- Pilot projects -- Backing up the Cloud -- What value is added by the Cloud? -- Complexity equals inherent risk -- Reduce the complexity of the organization -- E-mail service and web hosting -- Cloud-based enterprise applications -- Using Web 2.0 to support internal clients -- Frameworks for process improvement -- Case study: voice in the Clouds -- Quality of service and net neutrality -- Case study: online storage in the Cloud -- Data loss prevention -- Case study: moving a webzine to the Cloud -- CHAPTER 7: ABOVE THE CLOUDS -- Transition -- Convergence -- The paradigm of the automated teller machine -- Trading functionality for security -- Staged conversion: parallel testing -- ITG RESOURCES.
Summary: Explains how to get the benefits of Cloud computing, while minimising the associated risks.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00037733
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00037733
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Intro -- PREFACE -- What is Cloud Computing? -- Shared service model -- Computing as a commodity service -- Simplicity versus complexity -- Data center efficiency -- The way ahead -- ABOUT THE AUTHOR -- ACKNOWLEDGEMENTS -- CONTENTS -- INTRODUCTION -- Virtualization -- Time slice -- Hypervisor -- Public, private, community and hybrid Clouds -- SaaS, IaaS and PaaS -- Disruptive technology -- Trusting the Cloud: stop, go or caution -- CHAPTER 1: SETTING COURSE TO THE CLOUDS -- Renting versus owning infrastructure -- Scalability -- The larger they are, the less likely they are to fall -- Going virtual -- Cloud platforms and rapid system prototyping -- Consolidating low-use applications -- Patch management services -- Cloud backup -- Cloud bursting: surge capacity -- Desktop office suites -- Symphony -- Zoho Office for SharePoint® -- Google™ Docs -- Crowdsourcing and social networking -- The operating system -- Green computing: power and the grid -- Major benefits of Cloud Computing -- Core competencies of the data center staff -- Increased utilization -- 24/7 watch centers -- Enhanced recovery through server and data replication -- Free staff time -- Capital expenses replaced with operational expenses -- External certification and quality of service -- CHAPTER 2: PREFLIGHT CHECK -- Computing as a utility -- Elasticity -- Capacity requirements -- Baseline service levels -- In-sourcing -- Targeting legacy systems -- Planning for staff transition -- Avoiding self-inflicted wounds -- Economies of scale -- Bigger pipes are better -- Moving big iron (mainframes) to the Clouds -- Storage in the Cloud -- Bandwidth and try it before you buy it -- Instant test beds -- Reduce the scope of the implementation -- Pod computing reduces configuration time -- Project management versus ad hoc -- Elasticity reduces need for capacity planning -- Calculating cost benefit.

CHAPTER 3: TAXI RUNWAY -- Start-up risks -- Choosing a service provider -- Types of Cloud services -- Risk assessment and gap analysis -- Certifications - caveat emptor, let the buyer beware! -- Measuring service levels -- Latency -- User expectations and response time -- Culture of compliance -- Early adoption techniques -- Human resources and background checks -- Infrastructure -- Multi-tenancy -- Avoiding miscommunication with the service provider -- Reduce the risk by converting only new applications -- Have an exit strategy -- One size does not fit all -- People again -- Disaster recovery and business continuity planning -- Depth on the bench -- Separation of duties and need to know -- Financial health of the service provider -- Financial risk -- CHAPTER 4: TOWER CLEARANCE -- Organizational impact: what would happen if? -- Mitigation strategies: what can we do to lessen impact? -- Continuity plans: keep going if the worst happens -- External versus internal hosting providers -- Strategies for managing change -- Break the project into smaller parts for pilot projects -- Progressive elaboration -- Testing -- Certification of data centers -- Pick on the little guy -- Continuity of operations planning -- Protecting data with encryption -- Unencrypted data protection -- Data loss prevention -- Stay in touch with the Cloud! -- People, process, and then technology -- Certifications matter -- CHAPTER 5: SECURING THE CABIN -- Recognize the risk in order to avoid the consequences -- Defense in depth strategies -- Cloud security operation centers -- User provisioning -- Security and authentication in the Cloud -- CHAPTER 6: TAKE OFF -- If it's on the Internet, it belongs in the Cloud -- E-mail in the Clouds -- Linking to expertise -- Case study: backup and recovery centers -- Case study: primary data centers -- Reducing the noise.

Attack surfaces multiply -- Security in the Cloud -- Server logs -- Linking systems dynamically -- Mashups -- Privacy versus security -- Organizing the Cloud environment -- The portal model -- Pilot projects -- Backing up the Cloud -- What value is added by the Cloud? -- Complexity equals inherent risk -- Reduce the complexity of the organization -- E-mail service and web hosting -- Cloud-based enterprise applications -- Using Web 2.0 to support internal clients -- Frameworks for process improvement -- Case study: voice in the Clouds -- Quality of service and net neutrality -- Case study: online storage in the Cloud -- Data loss prevention -- Case study: moving a webzine to the Cloud -- CHAPTER 7: ABOVE THE CLOUDS -- Transition -- Convergence -- The paradigm of the automated teller machine -- Trading functionality for security -- Staged conversion: parallel testing -- ITG RESOURCES.

Explains how to get the benefits of Cloud computing, while minimising the associated risks.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.