Cloud computing

Book description

Cloud computing is seen as one of the main business drivers for growth and innovation, yet debate continues around its benefits, security and data protection issues. This ebook looks at different aspects of the cloud, from strategic considerations to legal and security issues, aiming to provide a clearer picture of its benefits and drawbacks.

Table of contents

  1. Copyright
  2. Advert Page
  3. CONTENTS
  4. SECTION 1: WHAT IS THE CLOUD?
    1. 1 WHAT IS CLOUD COMPUTING?
      1. THE SERVICES IN THE CLOUD
      2. THE EVOLUTION OF CLOUD COMPUTING
      3. CLOUD FORMATIONS
      4. SILVER LININGS AND THUNDER CLOUDS
    2. 2 DON’T BELIEVE THE HYPE
      1. BENEFITS
      2. TECHNICAL CONSIDERATIONS
      3. LEGAL ASPECTS
  5. SECTION 2: THE CASE FOR THE CLOUD
    1. 3 BUILDING ROI FROM CLOUD COMPUTING
      1. THE RACE TO THE BOTTOM VERSUS QUALITY OF SERVICE
      2. BUILDING ROI
    2. 4 THE POTENTIAL OF CLOUD
      1. BENEFITS AND CONCERNS
      2. GETTING ONTO THE CLOUD: WHERE TO START AND WHAT TO DO?
  6. SECTION 3: MOVING TO THE CLOUD
    1. 5 OVERCOMING OBSTACLES
      1. WHY GO TO THE CLOUD?
      2. BARRIERS TO CLOUD ADOPTION
      3. CONNECTIVITY
      4. THE CLOUD IS COMING
    2. 6 CLOUD COMPUTING AND ENTERPRISE ARCHITECTURE
    3. 7 MANAGING THE RISKS TO CLOUD
      1. CONTROL AND INNOVATION
      2. THE THREE FUNDAMENTALS
      3. MANAGING RISK
      4. RISK MANAGE CLOUD FOR TRANSFORMATION
  7. SECTION 4: CHANGING THE IT INFRASTRUCTURE
    1. 8 THE DEATH OF THE OFFICE SERVER
      1. UP, UP AND AWAY
      2. THE APPLICATION OF EFFICIENCY
    2. 9 MANAGING MAJOR NETWORK CHANGE: CHALLENGE AND OPPORTUNITY
      1. CHALLENGING TIMES FOR IT MANAGERS
      2. MOBILE DEVICES AND CONSUMERISATION
      3. BEST PRACTICE AND NETWORK MATURITY
      4. BE PREPARED
      5. NOTHING IS PERMANENT EXCEPT CHANGE
  8. SECTION 5: SECURITY IN THE CLOUD
    1. 10 PROTECTING DATA IN THE CLOUD
      1. UNDERSTAND YOUR DATA ASSETS
      2. SECURING THE CLOUD WITH CRYPTOGRAPHY
      3. UNDERSTAND DIFFERENT TYPES OF ENCRYPTION
      4. STRONG CRYPTOGRAPHY
      5. BEST PRACTICES
      6. MOVING TO THE CLOUD
    2. 11 TRUSTING THIRD PARTIES WITH YOUR DATA
      1. CLOUD TAKES OFF
      2. A NEUTRAL APPROACH
      3. A COMMUNITY FEEL
      4. SECURITY CONCERNS
      5. DATA DIFFICULTIES
    3. 12 AUTHENTICATING THE CLOUD
      1. TWO-FACTOR AUTHENTICATION
      2. SINGLE SIGN-ON
    4. 13 SKILLS FOR A SAFER CLOUD
    5. 14 DATA PROTECTION AND SECURITY: A LEGAL VIEW
      1. IMPORTANT CLAUSES IN A CLOUD COMPUTING CONTRACT FOR SERVICES
  9. USEFUL LINKS
    1. ORGANISATIONS
    2. GUIDELINES AND REPORTS
    3. OPINION

Product information

  • Title: Cloud computing
  • Author(s): BCS, The Chartered Institute for IT
  • Release date: March 2012
  • Publisher(s): BCS, The Chartered Institute for IT
  • ISBN: 9781780171319