Securing the Cloud: Cloud Computer Security Techniques and Tactics

Kybernetes

ISSN: 0368-492X

Article publication date: 27 April 2012

976

Citation

Hutton, D.M. (2012), "Securing the Cloud: Cloud Computer Security Techniques and Tactics", Kybernetes, Vol. 41 No. 3/4. https://doi.org/10.1108/k.2012.06741caa.012

Publisher

:

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited


Securing the Cloud: Cloud Computer Security Techniques and Tactics

Article Type: Book reviews and reports From: Kybernetes, Volume 41, Issue 3/4

J.R. Winkler,Syngress,Waltham, MA,2011,Price: contact the publishers,314 pp.,ISBN: 978-1-597-49592-9

System security is of such great concern to users with interests in cybernetics, systems and management science that it has become as important as the system content that is stored, processed and communicated over networks.

This books claims to provide a “different approach” to cloud computer security. It tells us that cloud computer technology offers flexibility, adaptability and scalability all of which improves operations and consequently saves money.

It therefore needs security from attacks. This book describes a framework for safeguarding the system whilst also introducing methods for using this new technology.

D.M. HuttonBook Reviews and Reports Section Editor

Related articles