ABSTRACT

A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture and secure mobile coding standards.

part I|2 pages

Rethinking IT and Security

chapter 1|8 pages

Tectonic Shifts

chapter 2|26 pages

The Evolving Threat Landscape

part II|2 pages

Deconstructing Cloud Security

chapter 3|12 pages

Cloud Dialogues

part III|2 pages

Securing Private Cloud Computing

chapter 4|12 pages

Segmentation and the Private Cloud

chapter 5|10 pages

Orchestration and Cloud Management

chapter 6|18 pages

Encryption Services

chapter 7|10 pages

Threat Intelligence

chapter 8|10 pages

Identity Management for Private Clouds

part IV|2 pages

Securing Public Clouds

chapter 9|10 pages

Enterprise Cloud Governance

chapter 10|8 pages

Cursory Cloud Use Review

chapter 11|22 pages

In-Depth Cloud Assessment

chapter 12|4 pages

Third-Party Cloud Assessment

part V|2 pages

Securing Mobile

chapter 13|8 pages

Mobile Security Infrastructure

chapter 14|14 pages

The Mobile Client Itself

chapter 16|10 pages

Creating Secure Mobile Applications