Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems. It gives readers unique and essential insight into the history of security certification and its evolution from static to dynamic models. The book helps readers to understand the importance of security certification across distributed system evolution from cloud-based to artificial intelligence-machine learning systems. It covers in full the certification of cloud-based composite services, discussing the role of multi-factor certification. It also emphasizes processes for continuously certifying services across system and context changes, as well as the certification of the deployment environment and development process and their impact on the overall cloud service certification. The book considers and challenges existing security certification schemes for cloud services, discussing issues and gaps when applied to modern systems in the cloud-edge continuum and built on artificial intelligence. Readers will become familiar with the challenges in certifying cloud-edge distributed systems and machine learning-based systems.
This book also provides actionable insight to readers who manage modern security systems. Security controls have grown in size and complexity, requiring reliable and sustainable certification schemes to support varying quality standards and produce compliant products. It covers the logic behind security standards and the evaluation criteria of main certification standards, further discussing the evolution and corresponding certification of distributed systems towards cloud, cloud-edge, and artificial intelligence. The book teaches readers how to build faster, scalable, and more reliable cloud-edge distributed systems and beyond.
Comments