For cloud users and providers alike, security is an everyday concern, yetthere are very few books covering cloud security as a main subject. Thisbook will help address this information gap from an Information Technologysolution and usage-centric view of cloud infrastructure security. The bookhighlights the fundamental technology components necessary to buildand enable trusted clouds. Here also is an explanation of the security andcompliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrityrooted in hardware, can address these challenges.This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of truste...