Cloud Computing Security
Home > Computing and Information Technology > Computer security > Privacy and data protection > Cloud Computing Security: Strategies and Best Practices
Cloud Computing Security: Strategies and Best Practices

Cloud Computing Security: Strategies and Best Practices


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
About the Book

The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools needed to secure cloud platforms. Topics include cloud attack vectors, defence mechanisms, implementation challenges, and real-world case studies of major cloud service providers. Practical exercises and end-of-chapter questions reinforce key concepts, making this an essential resource. Designed for undergraduate and postgraduate students in computer science and cybersecurity, this book serves as a vital guide to securing cloud infrastructures and ensuring data integrity in a rapidly evolving technological landscape. Covers cloud security concepts, attack types, and defense mechanisms Includes cloud security tools, real-world case studies, and hands-on projects Discusses risk mitigation techniques and security best practices for cloud environments Examines real-world obstacles and solutions in cloud security adoption Analyses major cloud service providers and their security models

Table of Contents:
1. Introduction to Cloud Computing 2. Cloud computing security 3. Attacks in cloud computing 4. Defense Techniques in cloud 5. Cloud computing tools 6. Secure Cloud Computing Implementation Challenges 7. Extension to Cloud computing 8. Cloud technologies 9. Case Studies 10. Practical hands-on Platforms 11. Major research fields 12. Hands-on Projects for practice

About the Author :
Neha Agrawal is currently working as an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Information Technology (IIIT) Sri City, Chittoor, AP, India. She received her Ph.D. degree from Atal Bihari Vajpayee – Indian Institute of Information Technology and Management (ABV- IIITM), Gwalior, Madhya Pradesh, India. She completed her M.Tech. in Computer Science and Engineering with a specialization in Information Security from ABV- IIITM, Gwalior and her B.E. in Information Technology from Madhav Institute of Technology and Science, Gwalior. She is a Senior Member of IEEE and Life Member of the International Association of Engineers (IAENG) and the Internet Society (ISOC). She was a Visiting Research Scholar at Anglia Ruskin University, Chelmsford, United Kingdom. She has published many research papers in reputed journals/conferences including IEEE Communications Surveys and Tutorials. She is also an active reviewer of many SCI- indexed journals. Her primary research interests are Cloud Computing Security, Software- Defined Networking, Cyber Security, Fog/Edge Computing, and Industry 4.0. She has been teaching various subjects across Institute Core, Institute Elective, Program Core, and Specialization Elective categories including C Programming, Design and Analysis of Algorithms, Computer Architecture, Cloud Computing, Network and Data Security, Introduction to Cyber Security, Software Defined Networks, etc. Her publications can be accessed using the link below. https://scholar.google.com/citations?user=EqJapj4AAAAJ&hl=en Rohit Kumar is currently working as an Assistant Professor in the Department of Engineering Sciences at the Atal Bihari Vajpayee – Indian Institute of Information Technology and Management (ABV- IIITM), Gwalior, Madhya Pradesh, India. He completed his Ph.D. in Computer Science and Engineering from Dr. Shyama Prasad Mukherjee International Institute of Information Technology, Naya Raipur (DSPM- IIITNR), India, and his M.Tech. from ABV- IIITM, Gwalior, India. He is a Senior Member of IEEE, and Life Member of the Computer Society of India (CSI- INDIA) and the Indian Society for Technical Education (ISTE). His current research interests include Cyber Physical Systems, Software Defined Networking, Internet of Things, and Cloud Computing networks. He has published some of his research works in reputed international conferences and SCI/SCIE- indexed journals including IEEE International Conference on Advanced Networks and Telecommunications Systems (IEEE ANTS), International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE Transactions on Network and Service Management, IEEE Systems Journal, Computer Science Review, Computer Networks, etc., respectively. In addition to this, he has been the best paper recipient for his work in IEEE ANTS- 2019. Furthermore, he is a Life- Member/Member of different scientific and research- based societies including IEEE, CSI- INDIA, ISTE, ISDS, etc. https://scholar.google.co.in/citations?user=BlXa-B8AAAAJ&hl=en Shashikala Tapaswi is a Professor (HAG) in Atal Bihari Vajpayee - Indian Institute of Information Technology and Management, Gwalior, Madhya Pradesh, India. She received her Ph.D degree from Indian Institute of Technology (IIT) Roorkee. She has 30+ years of professional experience. Her primary research areas are Computer Networks, Network Security, Mobile Adhoc Networks, Artificial Intelligence, Neural Network, Fuzzy Logic, Digital Image Processing, and Cloud Computing. She has been teaching many subjects like Cloud Computing, Malware Analysis, Computer Networks, Operating System, etc. Her publications can be accessed using the link below. https://scholar.google.co.in/citations?user=fIWR6rEAAAAJ&hl=en


Best Sellers


Product Details
  • ISBN-13: 9781032840093
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Chapman & Hall/CRC
  • Height: 234 mm
  • No of Pages: 450
  • Weight: 453 gr
  • ISBN-10: 1032840099
  • Publisher Date: 26 Sep 2025
  • Binding: Paperback
  • Language: English
  • Sub Title: Strategies and Best Practices
  • Width: 156 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cloud Computing Security: Strategies and Best Practices
Taylor & Francis Ltd -
Cloud Computing Security: Strategies and Best Practices
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cloud Computing Security: Strategies and Best Practices

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!