Controls & Assurance in the Cloud: Using COBIT 5

Controls & Assurance in the Cloud: Using COBIT 5

Author: ISACA

Publisher: ISACA

Published: 2014-03-24

Total Pages: 266

ISBN-13: 1604204648

DOWNLOAD EBOOK

"This practical guidance was created for enterprises using or considering using cloud computing. It provides a governance and control framework based on COBIT 5 and an audit program using COBIT 5 for Assurance. This information can assist enterprises in assessing the potential value of cloud investments to determine whether the risk is within the acceptable level. In addition, it provides a list of publications and resources that can help determine if cloud computing is the appropriate solution for the data and processes being considered."--


Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing

Author: Munir, Kashif

Publisher: IGI Global

Published: 2015-07-28

Total Pages: 409

ISBN-13: 1466683880

DOWNLOAD EBOOK

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.


Cloud Security: Concepts, Methodologies, Tools, and Applications

Cloud Security: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2019-04-01

Total Pages: 2218

ISBN-13: 1522581774

DOWNLOAD EBOOK

Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data on the cloud is imperative. Cloud Security: Concepts, Methodologies, Tools, and Applications explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud, this multi-volume book is ideally designed for IT specialists, web designers, computer engineers, software developers, academicians, researchers, and graduate-level students interested in cloud computing concepts and security.


Green, Pervasive, and Cloud Computing

Green, Pervasive, and Cloud Computing

Author: Rodrigo Miani

Publisher: Springer

Published: 2019-05-17

Total Pages: 262

ISBN-13: 3030192237

DOWNLOAD EBOOK

This book constitutes the proceedings of the 14th International Conference on Green, Pervasive, and Cloud Computing, GPC 2019, held in Uberlândia, Brazil, in May 2019. The 17 full papers included in this volume were carefully reviewed and selected from 38 initial submissions. They are organized in the following topical sections: machine learning; Internet of Things and mobility; cloud and related technologies.


COBIT 5 for Risk

COBIT 5 for Risk

Author: ISACA

Publisher: ISACA

Published: 2013-09-25

Total Pages: 246

ISBN-13: 1604204575

DOWNLOAD EBOOK

Information is a key resource for all enterprises. From the time information is created to the moment it is destroyed, technology plays a significant role in containing, distributing and analysing information. Technology is increasingly advanced and has become pervasive in enterprises and the social, public and business environments.


Implementing Effective IT Governance and IT Management

Implementing Effective IT Governance and IT Management

Author: Gad Selig

Publisher: Van Haren

Published: 2015-02-01

Total Pages: 445

ISBN-13: 9401805288

DOWNLOAD EBOOK

This book is a revised edition of the best selling title Implementing IT Governance (ISBN 978 90 8753 119 5).For trainers free additional material of this book is available. This can be found under the "Training Material" tab. Log in with your trainer account to access the material. In all enterprises around the world, the issues, opportunities and challenges of aligning IT more closely with the organization and effectively governing an organization s IT investments, resources, major initiatives and superior uninterrupted service is becoming a major concern of the Board and executive management. An integrated and comprehensive approach to the alignment, planning, execution and governance of IT and its resources has become critical to more effectively align, integrate, invest, measure, deploy, service and sustain the strategic and tactical direction and value proposition of IT in support of organizations. Much has been written and documented about the individual components of IT Governance such as strategic planning, demand management, program and project management, IT service management, strategic sourcing and outsourcing, performance management, metrics, compliance and others. Much less has been written about a comprehensive and integrated approach for IT/Business Alignment, Planning, Execution and Governance. This title fills that need in the marketplace and offers readers structured and practical solutions using the best of the best practices available today. The book is divided into two parts, which cover the three critical pillars necessary to develop, execute and sustain a robust and effective IT governance environment:- Leadership, people, organization and strategy,- IT governance, its major component processes and enabling technologies. Each of the chapters also covers one or more of the following action oriented topics:- the why and what of IT: strategic planning, portfolio investment management, decision authority, etc.;- the how of IT: Program/Project Management, IT Service Management (including ITIL); Strategic Sourcing and outsourcing; performance, risk and contingency management (including COBIT, the Balanced Scorecard etc.) and leadership, team management and professional competences.


On the Move to Meaningful Internet Systems: OTM 2015 Conferences

On the Move to Meaningful Internet Systems: OTM 2015 Conferences

Author: Christophe Debruyne

Publisher: Springer

Published: 2015-10-29

Total Pages: 702

ISBN-13: 3319261487

DOWNLOAD EBOOK

This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and selected from 144 initial submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.


Cloud Security and Privacy

Cloud Security and Privacy

Author: Tim Mather

Publisher: "O'Reilly Media, Inc."

Published: 2009-09-04

Total Pages: 338

ISBN-13: 1449379516

DOWNLOAD EBOOK

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security