Developing and Securing the Cloud by Bhavani Thuraisingham
Home > Computer & Internet > Computing: general > Health & safety aspects of computing > Developing and Securing the Cloud
Developing and Securing the Cloud

Developing and Securing the Cloud


     0     
5
4
3
2
1



International Edition


About the Book

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.

Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies.

Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds.

Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas.

This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.


About the Author:

Dr. Bhavani Thuraisingham is the Louis A. Beecherl, Jr. I Distinguished Professor in the Erik Jonsson School of Engineering and Computer Science at The University of Texas at Dallas (UTD) since September 2010. She has unique experience working in the commercial industry, federal research laboratory, US government and academia, and her 30+ year career includes research and development, technology transfer, product development, program management, and consulting to the federal government.

Dr. Thuraisingham joined UTD in October 2004 as a Professor of Computer Science and Director of the Cyber Security Research Center which conducts research in data security and privacy, secure systems, secure networks, secure languages, secure social media, data mining and semantic web. She is an elected Fellow of several prestigious organizations including the IEEE (Institute for Electrical and Electronics Engineers, 2002), the AAAS (American Association for the Advancement of Science, 2003), the BCS (British Computer Society, 2005), and the SPDS (Society for Design and Process Science - a society that promotes transdisciplinary research - 2011). She is the recipient of numerous awards including (i) the IEEE Computer Society's 1997 Technical Achievement Award for outstanding and innovative contributions to secure data management, (ii) the 2010 Research Leadership Award for Outstanding and Sustained Leadership Contributions to the Field of Intelligence and Security Informatics presented jointly by the IEEE Intelligent and Transportation Systems Society and the IEEE Systems, Man and Cybernetics Society (iii) the 2010 ACM SIGSAC (Association for Computing Machinery, Special Interest Group on Security, Audit and Control) Outstanding Contributions Award for seminal research contributions and leadership in data and applications security for over 25 years and (iv) the 2011 AFCEA (Armed Forces Communications and Electronics Association) Medal of Merit for Sustained Professional Excellence in Communications, Electronics, Intelligence and Information Systems and Service to the Association. She is a Distinguished Scientist of ACM, was an IEEE Distinguished Lecturer between 2002 and 2005, and was also featured by Silicon India magazine as one of the seven leading technology innovators of South Asian origin in the USA in 2002. She received the prestigious earned higher doctorate degree of Doctor of Engineering from the University of Bristol, England for her thesis consisting of her published works on secure dependable data management.

Over her 30+ year career, Dr. Thuraisingham's pioneering research contributions include (i) proving that the inference problem is unsolvable and finding solutions to solvable classes of the problem, which has been quoted by the National Security Agency as the significant development in database security in 1990, (ii) novel approaches to designing and developing multilevel secure relational distributed and object systems, (iii) incorporating security into real-time systems and analyzing the tradeoffs, (iv) developing solutions to semantic web-based policy management and incentives for information sharing among organizations and (iv) the development of data mining tools for malware and insider threat detection.

During her seven years at UTD, Dr. Thuraisingham has established and leads a strong research program in Intelligence and Security Informatics which now includes 6 core professors and the team has generated over $16 million in research funding from agencies such as NSF, AFOSR, IARPA, NGA, NASA, ONR, ARMY, NIH and DARPA as well as multiple corporations. The research projects include two NSF Career Grants, an AFOSR Young Investigator Program Award, DoD MURI Award on Assured Information Sharing, a large NSF Trustworthy Computing grant on data provenance, and multiple NSF medium grants (Cyber Trust, Trustworthy Computing and NeTS programs) on policy management, inline reference monitors and data integrity and multiple AFOSR grants on topics such as assured cloud computing and reactively adaptive malware. Her current focus includes three activities: (i) studying how terrorists and hackers function so that effective and improved solutions can be provided, (ii) initiating interdisciplinary programs integrating social sciences and information sciences and (iii) transferring the technologies developed at the university to commercial development efforts. She is also instrumental in establishing UTD's undergraduate certificate program as well as the MS Track in Information Assurance and is a Co-PI of the $1.8 million NSF Scholarship for Service Award in Cyber Security and PI on a capacity building grant from NSF on assured cloud computing. She teaches courses in data and applications security, trustworthy semantic services, digital forensics, biometrics, information security analytics, and secure cloud computing. Her team collaborates with the North Texas Regional Computer Forensics Laboratory for student projects, researchers from AFRL Rome, NY on assured cloud computing, and industrial research laboratories.

Prior to joining UTD, Dr. Thuraisingham was an IPA (Intergovernmental Personnel Act) at the National Science Foundation (NSF) in Arlington, VA, from the MITRE Corporation for three years. At NSF, she established the Data and Applications Security Program and co-founded the Cyber Trust theme and was involved in interagency activities in data mining for counter-terrorism. She worked at MITRE in Bedford, MA between January 1989 and September 2001, first in the Information Security Center and later as a department head in Data and Information Management as well as Chief Scientist in Data Management in the Intelligence and Air Force centers. At MITRE, she led team research and development efforts on secure data management and real-time data management for NSA, AFRL, SPAWAR, CECOM and CIA.

She also served as a technical consultant in information security and data management to the Department of Defense and the Intelligence Community for over 10 years and established research programs in data security and data mining. She has continued to serve as an expert consultant to the Department of Treasury since 1999 on software research credit and also advised the Department of Justice in 2001.

Thuraisingham's industry experience includes six years of research and product development as well as technology transfer at Control Data Corp. and Honeywell Inc. in Minneapolis, MN. While in industry and at MITRE, she was an adjunct professor of computer science and member of the graduate faculty, first at the University of Minnesota and later at Boston University between 1984 and 2001. She also worked as visiting professor soon after her PhD, first at the New Mexico Institute of Technology and later at the University of Minnesota between 1980 and 1983.

Dr. Thuraisingham's current research interests include data security and privacy and data mining for counter-terrorism. Her work has resulted in over 100 journal articles, over 200 refereed conference papers and workshops, five US patents (two pending) and several IP disclosures. She is the author of eleven books in data management, data mining and data security including on data mining for counter-terrorism, Database and Applications Security, and Data Mining Tools for Malware Detection and is completing her twelfth book on Building and Securing the Cloud. She is also the editor of twelve books. She has given over 90 keynote presentations at various technical conferences and has also given invited talks at the White House Office of Science and Technology Policy and at the United Nations on Data Mining for counter-terrorism. She serves (or has served) on editorial and advisory boards of leading research and industry journals including several IEEE and ACM Transactions, the VLDB Journal, and also served as the Editor in Chief of Computer Standards and Interfaces Journal. She has contributed to multiple standards activities including Navy's Next Generation Interface efforts, Object Management Group's Real-time Computing and C4I efforts, and more recently the Open Geospatial Consortium's semantic web efforts. In addition, she has been an instructor at AFCEA's (Armed Forces Communications and Electronics Association) Professional Development Center since 1998 and has served on panels for the Air Force Scientific Advisory Board and the National Academy of Sciences. She is a member of several professional organizations including the IFIP 11.3 Working Group in Data and Applications Security. She has chaired 10+ conferences and has served in 100+ conference program committees. She served on the advisory board of the Computer Science Department of Purdue University from 2005 to 2006.

Dr. Thuraisingham received her BS degree in Mathematics and Physics with first class at the University of Ceylon, her M.Sc degree in Mathematical Logic at the University of Bristol, UK and her PhD degree in Theory of Computation at the University of Wales, UK. She strongly believes in continuing education and has also received a number of professional qualifications to enhance her 30 year career since 1980 including an MS in Computer Science focusing in computer systems and networks at the University of Minnesota, Java Development Certification from Learning Tree International, the Certificate in Terrorism Studies at St. Andrews University, Scotland and CISSP (Certified Information Systems Security Professional) certification with ISC2.

Dr. Thuraisingham is the founding president of Bhavani Security Consulting, LLC, a company providing services in consulting and training in Cyber Security and Information Technology. She is also the founder of Knowledge and Security Analytics, LLC, a spin-off company from UTD developing tools in assured information sharing and Evolving Malware Security, LLC a second spinoff company from UTD developing malware detection tools. She also serves on the inaugural corporate board of Accuvant Corporation since 2011.

Dr. Thuraisingham promotes Math and Science to high school students as well as to women and underrepresented minorities, and is a member of the Society of Women Engineers (SWE). She has participated in panels at CRA-W and has given featured addresses at conferences sponsored by WITI (Women in Technology International) and SWE. Her additional awards include the 2001 Woman of Color Research Leadership Award from Career Communications Inc. and the Fellow of the Society of Information Reuse and Integration (subcommittee of IEEE Systems, Man and Cybernetics Society). She has been involved with IEEE Computer Society activities for over 10 years first serving on the conferences and tutorial board and later on the awards board. She also serves on the ACM Policy Council advising about policy issues on privacy and intellectual property and on the ACM-W council promoting women in computing. She is a strong advocate for safeguarding children and has participated in a National Academy panel on protecting children from inappropriate content on the Internet chaired by the Hon. Dick Thornburgh in 2000 and is continuing with these efforts and recently participated in the EastWest Institute's 1st Worldwide Security Summit panel on protecting our children in cyberspace. She also writes motivational articles including one on CS Careers in the Global Economy and another on an 8E framework for promoting women in science and engineering. Articles on her efforts and her vision, as well as her team's research, have appeared in multiple media outlets including the Dallas Morning News, The Boston Globe, ABC News, D Magazine, MITRE Matters, the DFW Metroplex Technology magazine and Raytheon Technology Magazine, as well as press releases published by UTD, MITRE, the United States Air Force, and IBM Research Zurich among others. She has also appeared on DFW television giving her views on cyber security.


Best Sellers



Product Details
  • ISBN-13: 9781439862919
  • Publisher: Auerbach Publications
  • Publisher Imprint: Auerbach Publications
  • Depth: 44
  • Height: 234 mm
  • No of Pages: 730
  • Series Title: English
  • Weight: 1255 gr
  • ISBN-10: 1439862915
  • Publisher Date: 28 Oct 2013
  • Binding: Hardback
  • Edition: 1
  • Language: English
  • Returnable: N
  • Spine Width: 46 mm
  • Width: 160 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Developing and Securing the Cloud
Auerbach Publications -
Developing and Securing the Cloud
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Developing and Securing the Cloud

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!