BOOK
Cloud computing
(2012)
Additional Information
Book Details
Abstract
Cloud computing is considered to be one of the main business drivers for growth and innovation, and a global survey by Gartner listed cloud computing as one of the top three technology priorities for CIOs in 2012. Yet debate continues around its real benefits, security and data protection issues. The articles in this ebook look at different aspects of cloud computing, from strategic and infrastructure considerations to legal and security issues, aiming to provide practical advice and a clearer picture of its benefits and drawbacks.
Cloud computing is considered to be one of the main business drivers for growth and innovation, and a global survey by Gartner listed cloud computing as one of the top three technology priorities for CIOs in 2012. Yet debate continues around its real benefits, security and data protection issues. The articles in this ebook look at different aspects of cloud computing, from strategic and infrastructure considerations to legal and security issues, aiming to provide practical advice and a clearer picture of its benefits and drawbacks.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
Advert Page | Cover2 | ||
CONTENTS | ii | ||
SECTION 1: WHAT IS THE CLOUD? | 1 | ||
1 WHAT IS CLOUD COMPUTING? | 2 | ||
THE SERVICES IN THE CLOUD | 3 | ||
THE EVOLUTION OF CLOUD COMPUTING | 3 | ||
CLOUD FORMATIONS | 4 | ||
SILVER LININGS AND THUNDER CLOUDS | 4 | ||
2 DON’T BELIEVE THE HYPE | 8 | ||
BENEFITS | 8 | ||
TECHNICAL CONSIDERATIONS | 9 | ||
LEGAL ASPECTS | 9 | ||
SECTION 2: THE CASE FOR THE CLOUD | 11 | ||
3 BUILDING ROI FROM CLOUD COMPUTING | 12 | ||
THE RACE TO THE BOTTOM VERSUS QUALITY OF SERVICE | 12 | ||
BUILDING ROI | 13 | ||
4 THE POTENTIAL OF CLOUD | 15 | ||
BENEFITS AND CONCERNS | 15 | ||
GETTING ONTO THE CLOUD: WHERE TO START AND WHAT TO DO? | 16 | ||
SECTION 3: MOVING TO THE CLOUD | 18 | ||
5 OVERCOMING OBSTACLES | 19 | ||
WHY GO TO THE CLOUD? | 19 | ||
BARRIERS TO CLOUD ADOPTION | 20 | ||
CONNECTIVITY | 20 | ||
THE CLOUD IS COMING | 21 | ||
6 CLOUD COMPUTING AND ENTERPRISE ARCHITECTURE | 22 | ||
7 MANAGING THE RISKS TO CLOUD | 26 | ||
CONTROL AND INNOVATION | 26 | ||
THE THREE FUNDAMENTALS | 27 | ||
MANAGING RISK | 27 | ||
RISK MANAGE CLOUD FOR TRANSFORMATION | 28 | ||
SECTION 4: CHANGING THE IT INFRASTRUCTURE | 29 | ||
8 THE DEATH OF THE OFFICE SERVER | 30 | ||
UP, UP AND AWAY | 30 | ||
THE APPLICATION OF EFFICIENCY | 31 | ||
9 MANAGING MAJOR NETWORK CHANGE: CHALLENGE AND OPPORTUNITY | 33 | ||
CHALLENGING TIMES FOR IT MANAGERS | 33 | ||
MOBILE DEVICES AND CONSUMERISATION | 33 | ||
BEST PRACTICE AND NETWORK MATURITY | 34 | ||
BE PREPARED | 35 | ||
NOTHING IS PERMANENT EXCEPT CHANGE | 35 | ||
SECTION 5: SECURITY IN THE CLOUD | 36 | ||
10 PROTECTING DATA IN THE CLOUD | 37 | ||
UNDERSTAND YOUR DATA ASSETS | 37 | ||
SECURING THE CLOUD WITH CRYPTOGRAPHY | 37 | ||
UNDERSTAND DIFFERENT TYPES OF ENCRYPTION | 38 | ||
STRONG CRYPTOGRAPHY | 39 | ||
BEST PRACTICES | 39 | ||
MOVING TO THE CLOUD | 39 | ||
11 TRUSTING THIRD PARTIES WITH YOUR DATA | 40 | ||
CLOUD TAKES OFF | 40 | ||
A NEUTRAL APPROACH | 40 | ||
A COMMUNITY FEEL | 41 | ||
SECURITY CONCERNS | 41 | ||
DATA DIFFICULTIES | 42 | ||
12 AUTHENTICATING THE CLOUD | 43 | ||
TWO-FACTOR AUTHENTICATION | 43 | ||
SINGLE SIGN-ON | 44 | ||
13 SKILLS FOR A SAFER CLOUD | 45 | ||
14 DATA PROTECTION AND SECURITY: A LEGAL VIEW | 48 | ||
IMPORTANT CLAUSES IN A CLOUD COMPUTING CONTRACT FOR SERVICES | 49 | ||
USEFUL LINKS | 53 | ||
ORGANISATIONS | 53 | ||
GUIDELINES AND REPORTS | 53 | ||
OPINION | 53 | ||
Copyright | 55 |