Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Half Title Title Page Copyright Page Table of Contents Foreword Extended Multimedia Content Introduction CHAPTER 1. Cloud User Perceptions CHAPTER 2. Economics of Cloud Computing CHAPTER 3. Process and Sources CHAPTER 4. Industry-Specific Findings
4.1 OFFICIAL TITLES 4.2 HIGHEST LEVEL OF EDUCATION 4.3 INDUSTRY REPRESENTATION 4.4 ORGANIZATIONAL REPORTING 4.5 ABILITY TO ENFORCE COMPLIANCE 4.6 METHOD THAT BEST PREPARES SOMEONE TO BECOME A CISO 4.7 CYBERATTACKS: A MAJOR THREAT TO INDUSTRY 4.8 TOP FIVE IT/CYBERSECURITY PRIORITIES IN THE NEXT 12 MONTHS 4.9 WHICH SECURITY STANDARDS/FRAMEWORKS ARE MOST EFFECTIVE? 4.10 WORKFORCE AND TALENT
CHAPTER 5. Cloud Computing
5.1 RISE OF THE INTERNET 5.2 THE TRANSFORMATION 5.3 KEY CHARACTERISTICS OF CLOUD COMPUTING 5.4 CLOUD COMPUTING DEPLOYMENT MODELS
5.4.1 Public Cloud 5.4.2 Benefits of Public Clouds 5.4.3 Private Cloud 5.4.4 Benefits of Private Clouds 5.4.5 Hybrid Cloud 5.4.6 Benefits of Hybrid Clouds 5.4.7 Community Cloud
5.5 CLOUD COMPUTING SERVICE MODELS 5.6 GENERAL CLOUD COMPUTING BENEFITS 5.7 CLOUD USE CASES 5.8 CLOUD COMPUTING TECHNOLOGIES
5.8.1 Commodity Hardware 5.8.2 Network Speed 5.8.3 Pervasive High-Quality Access 5.8.4 Data Storage Architectures 5.8.5 Data Centers 5.8.6 Virtualization 5.8.7 Hypervisor 5.8.8 Hardware Virtualization Types 5.8.9 Desktop Virtualization 5.8.10 Software Virtualization 5.8.11 Memory Virtualization 5.8.12 Storage Virtualization 5.8.13 Data Virtualization 5.8.14 Network Virtualization 5.8.15 Emerging Cloud Technologies
5.9 CLOUD ADOPTION TRENDS
5.9.1 Data Sent to High-Risk Cloud Services
CHAPTER 6. Cybersecurity
6.1 INTRODUCTION 6.2 MANAGING RISK IN THE CLOUD
6.2.1 The Risk Management Framework 6.2.2 Cloud Providers Risk Management Process 6.2.3 Cloud Consumers Risk Management Process
6.3 CYBERCRIME
6.3.1 The Hype 6.3.2 The Facts 6.3.3 Cyberattack Vectors 6.3.4 Occurrence of Cyberattacks 6.3.5 Cost of Successful Cyberattacks
6.4 EDUCATION AND TRAINING 6.5 TRENDS 6.6 GLOBAL
CHAPTER 7. Cloud Computing Vulnerabilities
7.1 ORGANIZATIONAL REPORTING
7.1.1 IT/Cybersecurity Executive Title
7.2 ORGANIZATIONAL BUDGET MANAGEMENT 7.3 OPERATIONAL PLANNING
7.3.1 Key Required Resources 7.3.2 Key Future Initiatives 7.3.3 Quality of Network IT/Cybersecurity 7.3.4 Number of Security Breaches Experienced in the Past 2 Years 7.3.5 Most Recent IT/Cybersecurity Risk Assessment 7.3.6 Source for Comparative IT/Cybersecurity Metrics 7.3.7 Security Standards/Frameworks Used 7.3.8 New Technology Strategy Posture 7.3.9 Cybersecurity Staffing Source 7.3.10 Cyber Defense Priorities
7.4 THREAT EXPECTATIONS
7.4.1 Type of Attack 7.4.2 Type of Attackers 7.4.3 Application Security Risks
7.5 CYBERSECURITY OPERATIONS
7.5.1 Number of Security Positions 7.5.2 Key CISO Activities
CHAPTER 8. General Cybersecurity Threat by Industry
8.1 ENERGY/UTILITIES
8.1.1 Vertical View (AlertLogic_Energy Sector_Cloud Security Report.pdf) 8.1.2 Energy-Specific Vulnerabilities
8.2 BANKING/FINANCE
8.2.1 Vertical View 8.2.2 General
8.3 HEALTHCARE
8.3.1 Vertical View 8.3.2 General 8.3.3 Retail Pharmacies
8.4 INFORMATION TECHNOLOGY OUTSOURCING
8.4.1 General
8.5 EDUCATION
8.5.1 General
8.6 CYBERSECURITY CONSULTING SERVICE 8.7 GOVERNMENT/MILITARY
8.7.1 US Federal Sector
8.7.1.1 Federal 8.7.1.2 Insider Threats 8.7.1.3 Stolen Credentials 8.7.1.4 The Need for Compliance 8.7.1.5 Controlling Costs and Risk 8.7.1.6 Civilian Agencies 8.7.1.7 Defense 8.7.1.8 Intelligence Community
8.7.2 State and Local
8.7.2.1 State Security Breach Disclosure Laws
CHAPTER 9. Application Security by Industry
9.1 POLICY COMPLIANCE 9.2 INTERNALLY VERSUS EXTERNALLY DEVELOPED APPLICATIONS 9.3 APPLICATION FLAW DENSITY 9.4 APPLICATION REMEDIATION 9.5 HIGH-PROFILE VULNERABILITIES
CHAPTER 10. Cloud Computing and Cybersecurity Education Challenges
10.1 INDUSTRY VERTICAL KNOWLEDGE
10.1.1 Regulated Industries 10.1.2 Unregulated Industries
10.2 A GLOBAL CYBERSECURITY VIEW 10.3 GLOBAL LEGAL FRAMEWORK KNOWLEDGE 10.4 CISO TRAINING, EDUCATION, AND CERTIFICATION 10.5 HYBRID IT INFRASTRUCTURE MANAGEMENT 10.6 RISK MANAGEMENT FRAMEWORKS 10.7 KEY EDUCATIONAL TOPICS: CRITICAL THREATS TO CLOUD SECURITY 10.8 NEXT STEPS FOR EDUCATING THE CYBERSECURITY WORKFORCE 10.9 NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK 10.10 UNITED STATES NICE REFERENCES
CHAPTER 11. Next-Generation Business Models and Strategies
11.1 STRATEGIC REINVENTION
11.1.1 Customer Value Propositions 11.1.2 Value Chains
11.2 BETTER DECISIONS 11.3 DEEPER COLLABORATION REFERENCE
APPENDIX A: ONCLOUD TRAINING SECURITY OFFERINGS APPENDIX B: RELEVANT ARTICLES AND PUBLICATIONS APPENDIX C: CLOUD COMPUTING FOR THE BUSINESS OF GOVERNMENT APPENDIX D: IMPLEMENTATION OF CLOUD BROKERAGE APPENDIX E: THE WEB SERVICES AND SERVICE-ORIENTED ARCHITECTURE REVOLUTION—USING WEB SERVICES TO DELIVER APPENDIX F: SOFTWARE AS A SERVICE INFLECTION POINT—USING CLOUD COMPUTING TO ACHIEVE BUSINESS AGILITY APPENDIX G: FITARA AND FedRAMP—ACCELERATING FEDERAL CLOUD ADOPTION INDEX
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion