|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn881570474 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140623s2014 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DEBSZ
|d OCLCQ
|d RECBK
|d OCLCQ
|d Z5A
|d OCLCO
|d OCLCF
|d ZCU
|d MERUC
|d OCLCA
|d OCLCQ
|d DKC
|d OCLCQ
|d UX1
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9781118817063
|
020 |
|
|
|a 1118817060
|
029 |
1 |
|
|a DEBBG
|b BV043610075
|
029 |
1 |
|
|a DEBSZ
|b 409824879
|
029 |
1 |
|
|a DEBSZ
|b 425888223
|
029 |
1 |
|
|a DEBSZ
|b 431698406
|
029 |
1 |
|
|a DEBSZ
|b 44943236X
|
035 |
|
|
|a (OCoLC)881570474
|
050 |
|
4 |
|a QA76.585 .A23 2014
|
082 |
0 |
4 |
|a 004.6782
|
084 |
|
|
|a TEC041000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Abbadi, Imad M.
|
245 |
1 |
0 |
|a Cloud Management and Security.
|
260 |
|
|
|a Hoboken :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource (497 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Titlepage; Copyright; About the Author; Preface; Guide to Using this Book; Notes; References; Acknowledgments; Acronyms; 1 Introduction; 1.1 Overview; 1.2 Cloud Definition; 1.3 Cloud Evolution; 1.4 Cloud Services; 1.5 Cloud Deployment Types; 1.6 Main Challenges of Clouds; 1.7 Summary; 1.8 Exercises; References; Part One CLOUD MANAGEMENT; 2 Cloud Structure; 2.1 Introduction; 2.2 Infrastructure Components; 2.3 Cloud Layers; 2.4 Cloud Relations; 2.5 Cloud Dynamics; 2.6 Data Types; 2.7 Summary; 2.8 Exercises; Notes; References; 3 Fundamentals of Cloud Management; 3.1 Introduction.
|
505 |
8 |
|
|a 3.2 Clouds Management Services3.3 Virtual Control Center; 3.4 Prerequisite Input Data for Management Services; 3.5 Management of User Requirements; 3.6 Summary; 3.7 Exercises; Notes; References; 4 Cloud Properties; 4.1 Introduction; 4.2 Adaptability Property; 4.3 Resilience Property; 4.4 Scalability Property; 4.5 Availability Property; 4.6 Reliability Property; 4.7 Security and Privacy Property; 4.8 Business Model; 4.9 Summary; 4.10 Exercises; References; 5 Automated Management Services; 5.1 Introduction; 5.2 Virtual Layer Self-managed Services; 5.3 Virtual Services Interdependency.
|
505 |
8 |
|
|a 5.4 Application Layer Self-managed Services5.5 Application Services Interdependency; 5.6 Security and Privacy by Design; 5.7 Multi-tier Application Deployment in the Cloud; 5.8 Main Challenges and Requirements; 5.9 Summary; 5.10 Exercises; Notes; References; Part Two CLOUD SECURITY FUNDAMENTALS; 6 Background; 6.1 Topics Flow; 6.2 Trusted Computing; 6.3 Summary; Notes; References; 7 Challenges for Establishing Trust in Clouds; 7.1 Introduction; 7.2 Effects of Cloud Dynamism on Trust Relationships; 7.3 Challenges; 7.4 Summary; 7.5 Exercises; References; 8 Establishing Trust in Clouds.
|
505 |
8 |
|
|a 8.1 Introduction8.2 Organization Requirements; 8.3 Framework Requirements; 8.4 Device Properties; 8.5 Framework Architecture; 8.6 Required Software Agents; 8.7 Framework Workflow; 8.8 Discussion and Analysis; 8.9 Summary; 8.10 Exercises; References; 9 Clouds Chains of Trust; 9.1 Introduction; 9.2 Software Agents Revision; 9.3 Roots of and Chains of Trust Definition; 9.4 Intra-layer Chains of Trust; 9.5 Trust Across Layers; 9.6 Summary; 9.7 Exercises; Notes; References; 10 Provenance in Clouds; 10.1 Introduction; 10.2 Motivating Scenarios; 10.3 Log Records Management and Requirements.
|
505 |
8 |
|
|a 10.4 Framework Domain Architecture10.5 Framework Software Agents; 10.6 Framework Workflow; 10.7 Threat Analysis; 10.8 Discussion and Future Directions; 10.9 Summary; 10.10 Exercises; References; 11 Insiders; 11.1 Introduction; 11.2 Insiders Definition; 11.3 Conceptual Models; 11.4 Summary; 11.5 Exercises; References; Part Three PRACTICAL EXAMPLES; 12 Real-Life Examples; 12.1 OpenStack; 12.2 Amazon Web Services; 12.3 Component Architecture; 12.4 Prototype; 12.5 Summary; Notes; References; 13 Case Study; 13.1 Scenario; 13.2 Home Healthcare Architecture in the Cloud.
|
500 |
|
|
|a 13.3 Insiders Analysis for Home Healthcare.
|
520 |
|
|
|a "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--
|c Provided by publisher.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Web services.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Services Web.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Web services
|2 fast
|
758 |
|
|
|i has work:
|a Cloud management and security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGJgppPHhqWJhcFKd7M8wd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Abbadi, Imad M.
|t Cloud Management and Security.
|d Hoboken : Wiley, ©2014
|z 9781118817094
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1701403
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1701403
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00438535
|
994 |
|
|
|a 92
|b IZTAP
|