Skip to Content
Cloud Security and Privacy
book

Cloud Security and Privacy

by Tim Mather, Subra Kumaraswamy, Shahed Latif
September 2009
Intermediate to advanced
338 pages
11h 12m
English
O'Reilly Media, Inc.
Content preview from Cloud Security and Privacy

Glossary

AAA

Authentication, Authorization, and Accounting is a system used to control what computer resources users have access to and to keep track of the activity of users over a network.

Active Directory

A directory service from Microsoft.

Apex

An on-demand platform from Salesforce.com. Apex provides a set of features for building business applications using a proprietary language called Apex code.

API

An application programming interface is a series of software routines and development tools that comprise an interface between a computer application and lower-level services and functions (such as the operating system, device drivers, and other software applications). APIs serve as building blocks for programmers putting together software applications. In the context of cloud computing, APIs are sets of web services methods for accessing/manipulating cloud resources.

ASP

An application service provider is a business that provides computer-based services to customers over a network.

Asymmetric encryption

The use of two different keys, first for encryption (public key) and then for decryption (private key) of data.

Authentication

The act of confirming the identity of an individual or system.

Authorization

The act of specifying access rights to resources or functionality.

AWS

Amazon Web Services is a collection of infrastructure web services delivered over the Internet by Amazon.com.

CCID

The Cloud Computing Incidents Database (CCID) records and monitors verifiable, noteworthy events that affect cloud ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Cloud security

Cloud security

James Bond
Security, Privacy, and Digital Forensics in the Cloud

Security, Privacy, and Digital Forensics in the Cloud

Lei Chen, Hassan Takabi, Nhien-An Le-Khac

Publisher Resources

ISBN: 9780596806453Errata Page