|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn987087094 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
170513s2017 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d DEBBG
|d MERUC
|d OCLCQ
|d AU@
|d OCLCO
|d OCLCF
|d OCLCQ
|d TPA
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 986652379
|a 986932250
|a 1006584003
|a 1296082014
|
020 |
|
|
|a 9781119277422
|
020 |
|
|
|a 1119277426
|
020 |
|
|
|z 9781119277415
|
020 |
|
|
|z 1119277418
|
029 |
1 |
|
|a AU@
|b 000060819700
|
029 |
1 |
|
|a AU@
|b 000062359513
|
035 |
|
|
|a (OCoLC)987087094
|z (OCoLC)986652379
|z (OCoLC)986932250
|z (OCoLC)1006584003
|z (OCoLC)1296082014
|
050 |
|
4 |
|a QA76.585
|b .O43 2017
|
082 |
0 |
4 |
|a 004.6782
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wiley.
|
245 |
1 |
0 |
|a CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.
|
260 |
|
|
|a Somerset :
|b John Wiley & Sons, Incorporated,
|c 2017.
|
300 |
|
|
|a 1 online resource (387 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a CCSP® (ISC)2® Certified Cloud Security Professional: Official Study Guide; Acknowledgments; About the Authors; About the Technical Editors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1 Architectural Concepts; Business Requirements; Existing State; Quantifying Benefits and Opportunity Cost; Intended Impact; Cloud Evolution, Vernacular, and Definitions; New Technology, New Options; Cloud Computing Service Models; Cloud Deployment Models; Cloud Computing Roles and Responsibilities; Cloud Computing Definitions.
|
505 |
8 |
|
|a Foundational Concepts of Cloud ComputingSensitive Data; Virtualization; Encryption; Auditing and Compliance; Cloud Service Provider Contracts; Summary; Exam Essentials; Written Labs; Review Questions; Chapter 2 Design Requirements; Business Requirements Analysis; Inventory of Assets; Valuation of Assets; Determination of Criticality; Risk Appetite; Boundaries of Cloud Models; IaaS Boundaries; PaaS Boundaries; SaaS Boundaries; Design Principles for Protecting Sensitive Data; Hardening Devices; Encryption; Layered Defenses; Summary; Exam Essentials; Written Labs; Review Questions.
|
505 |
8 |
|
|a Chapter 3 Data ClassificationData Inventory and Discovery; Data Ownership; The Data Life Cycle; Data Discovery Methods; Jurisdictional Requirements; Data Rights Management; Intellectual Property Protections; DRM Tool Traits; Data Control; Data Retention; Data Audit; Data Destruction/Disposal; Summary; Exam Essentials; Written Labs; Review Questions; Chapter 4 Cloud Data Security; Cloud Data Life Cycle; Create; Store; Use; Share; Archive; Destroy; Cloud Storage Architectures; Volume Storage: File-Based Storage and Block Storage; Object-Based Storage; Databases; Content Delivery Network (CDN).
|
505 |
8 |
|
|a Cloud Data Security Foundational StrategiesEncryption; Masking, Obfuscation, Anonymization, and Tokenization; Security Information and Event Management; Egress Monitoring (DLP); Summary; Exam Essentials; Written Labs; Review Questions; Chapter 5 Security in the Cloud; Shared Cloud Platform Risks and Responsibilities; Cloud Computing Risks by Deployment and Service Model; Private Cloud; Community Cloud; Public Cloud; Hybrid Cloud; IaaS (Infrastructure as a Service); PaaS (Platform as a Service); SaaS (Software as a Service); Virtualization; Cloud Attack Surface; Threats by Deployment Model.
|
505 |
8 |
|
|a Countermeasure MethodologyDisaster Recovery (DR) and Business Continuity Management (BCM); Cloud-Specific BIA Concerns; Customer/Provider Shared BC/DR Responsibilities; Summary; Exam Essentials; Written Labs; Review Questions; Chapter 6 Responsibilities in the Cloud; Foundations of Managed Services; Business Requirements; Business Requirements: The Cloud Provider Perspective; Shared Responsibilities by Service Type; IaaS; PaaS; SaaS; Shared Administration of OS, Middleware, or Applications; Operating System Baseline Configuration and Management; Share Responsibilities: Data Access.
|
500 |
|
|
|a Customer Directly Administers Access.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Cloud computing
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
655 |
|
7 |
|a Study guides
|2 fast
|
700 |
1 |
|
|a Wiley, Ann.
|
700 |
1 |
|
|a O'Hara, Brian T.
|
700 |
1 |
|
|a Rubendunst, Tom.
|
776 |
0 |
8 |
|i Print version:
|a Wiley.
|t CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide.
|d Somerset : John Wiley & Sons, Incorporated, ©2017
|z 9781119277415
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4853992
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14419825
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14294312
|
994 |
|
|
|a 92
|b IZTAP
|