Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Cloud Security Volume 2 Best Practice

34,75 €*

Sofort verfügbar, Lieferzeit: 1-3 Tage

Produktnummer: 1845ded48d19aa486590ce176d8eab8e0d
Autor: Irmer, Uwe
Themengebiete: Cloud technology Data Security Dev Ops agile information security
Veröffentlichungsdatum: 20.05.2021
EAN: 9783754300916
Auflage: 1
Sprache: Englisch
Seitenzahl: 136
Produktart: Kartoniert / Broschiert
Verlag: BoD – Books on Demand
Untertitel: 2nd Edition 2021
Produktinformationen "Cloud Security Volume 2 Best Practice"
Cloud technology seems to be the business driver of the last few years. According to several studies, international corporations as well as small and medium-sized enterprises (SMEs) are looking to move their information technology to the cloud. Expectations are high and briefly summarised: Low costs for the use of information technology, flexible use and invoicing, always technologically up to date, high availability, high agility, no commitment of own resources, no responsibility for operation and maintenance. But what about governance compliance, responsibility towards information security and data protection? How is the cloud technology integrated into the company in compliance with laws, regulations and specifications, what responsibility does the management have, how are processes to be adapted, what effects arise for the company, what are the risks? Will changes occur in the company, what needs to be adapted? How are data protection laws complied with and how is information security? And how does the company protect itself against data theft, manipulation, destruction and possibly espionage? Cloud Security Basics in the updated 2nd edition shows which measures are necessary to be able to use cloud technology securely. After discussing the cloud technology with its architecture and the different objects that are available, the book describes the necessary organisational and technical measures to achieve security. It looks at governance, compliance, risk management, information security management and specifically addresses the situation of data protection. Finally, the book provides recommendations on which measures should be implemented.

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen