Posted by: MelanieYarbrough
Cloud security, IT Books
As Abraham Lincoln once said, “A capacity and taste for reading gives access to whatever has already been discovered by others.” In the realm of cloud computing security, there is no more valuable information than the hard-earned lessons of those that have come and adopted before you. Don’t make the same mistakes that have crippled others’ applications and data. Read up on the subject with these widely-reviewed and strongly-recommended titles on the subject:
- Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance: For anyone who is considering deploying to the cloud – whether on the investor side or practitioner side – this book seeks to explain the risks of moving data to the cloud as well as the ways to secure against them. A collaborative project among Tim Mather, Subra Kumaraswamy, and Shahed Latif, Cloud Security & Privacy explores the security measures relevant to the cloud including security-as-a-service.
- Cloud Security: A Comprehensive Guide to Secure Cloud Computing: Written by senior information systems security consultant Ronald L. Krutz and Chief Security Advisor for Gotham Technology Group, LLC, Russell Dean Vines, this book is a breakdown of the most difficult areas of cloud security. Pick this up if you’re looking for a “guide to helping you find your way through a maze of security minefields.” These days, who isn’t?
- Cloud Computing: Implementation, Management, and Security: From a co-founder of Hypersecurity and and the Senior Director and Chief Security Officer at the Cisco Collaborative Software Group, Cloud Computing is a great overview of the technology, providing definitions, repercussions, as well as pros and cons. Get the history leading up to cloud computing and finish up with profiles of successful cloud computing vendors.
- Web Application Obfuscation: One of the misconceptions about deploying existing applications in the cloud is that security will increase upon deployment. The truth? A faulty application outside the cloud will be just as – if not more – faulty in the cloud. Web Application Obfuscation explores, from an attacker’s perspective, traditional infrastructures and security measures to illustrate common vulnerabilities inherent in many security systems.
- Hacking: The Next Generation: There are many new ways for hackers to reach into your networks, and Hacking seeks to inform users about new hacks as well as attacks aimed specifically at social networking sites, wireless networks and cloud infrastructures.
And one to look forward to…
- Securing the Cloud: Written by a senior associate at Booz Allen Hamilton, Securing the Cloud presents the cloud in the context of existing security frameworks. Whether it’s the roadblocks standing in front of your deployment in the cloud or the adjustments necessary before and after cloud adoption, your concerns and considerations are covered in J.R. Winkler’s forthcoming book from Syngress.
Is an essential security read missing from our list? Let me know in the comments section or send me an email at Melanie@ITKnowledgeExchange.com!