Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Official (ISC)2 Guide to the CCSP CBK
  • Table Of Contents Toc
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK - Second Edition

By : Adam Gordon
close
close
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

By: Adam Gordon

Overview of this book

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skillset. The Official (ISC)2 Guide to the CCSPSM CBK second edition is your ticket for expert insight through the 6 CCSP domains. The book starts by focusing on building blocks of cloud-based systems and progresses to explaining concepts, principles, structures, and standards for designing, implementing, monitoring, and securing operating systems (OSs), equipment, networks, and applications. Next, you’ll cover cloud infrastructure components, existing threats, and mitigating and developing plans to deal with those threats. Moving ahead, you’ll ensure that the need for training and awareness in application security, the processes involved with cloud software assurance and validation, and the use of verified secure software are understood. Then, you’ll identify critical information and the execution of selected measures that eliminate adversary exploitation of critical information. In the end chapters, you’ll address ethical behavior and compliance with regulatory frameworks. By the end of this book, you’ll acquire the knowledge you'll need to implement strong information security programs in cloud computing.
Table of Contents (12 chapters)
close
close
Lock Free Chapter
1
Foreword
2
Introduction
9
EULA
2
Appendix B: Glossary
3
Appendix C: Helpful Resources and Links

Using Storage Clusters

Clustered storage is the use of two or more storage servers working together to increase performance, capacity, or reliability. Clustering distributes workloads to each server, manages the transfer of workloads between servers, and provides access to all files from any server regardless of the physical location of the file.

Clustered Storage Architectures

Two basic clustered storage architectures exist, known as tightly coupled and loosely coupled:

  • A tightly coupled cluster has a physical backplane into which controller nodes connect. While this backplane fixes the maximum size of the cluster, it delivers a high-performance interconnect between servers for load-balanced performance and maximum scalability as the cluster grows. Additional array controllers, input/output (I/O) ports, and capacity can connect into the cluster as demand dictates.
  • A loosely coupled cluster offers cost-effective building blocks that can start small and grow as applications demand. A...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Official (ISC)2 Guide to the CCSP CBK
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon