|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn722800241 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110512s2011 mau ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d CDX
|d OCLCQ
|d N$T
|d YDXCP
|d E7B
|d OCLCQ
|d DKDLA
|d TEF
|d DEBSZ
|d OCLCQ
|d TEFOD
|d OCLCF
|d TEFOD
|d OCLCQ
|d ICA
|d AGLDB
|d OCLCA
|d UUM
|d U3W
|d MNI
|d OCLCQ
|d VTS
|d INT
|d OCLCQ
|d WYU
|d OCLCQ
|d STF
|d AUD
|d LEAUB
|d C6I
|d EBLCP
|d UBY
|d COCUF
|d K6U
|d CNNOR
|d Z5A
|d ZCU
|d MERUC
|d D6H
|d ICG
|d AU@
|d DKC
|d SFB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 721194746
|a 726757691
|a 768975514
|
020 |
|
|
|a 9781597495929
|q (electronic bk.)
|
020 |
|
|
|a 1597495921
|q (electronic bk.)
|
020 |
|
|
|a 9781597495936
|q (electronic bk.)
|
020 |
|
|
|a 159749593X
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000048824893
|
029 |
1 |
|
|a AU@
|b 000059305782
|
029 |
1 |
|
|a CHNEW
|b 001010107
|
029 |
1 |
|
|a DEBBG
|b BV039829370
|
029 |
1 |
|
|a DEBBG
|b BV042314270
|
029 |
1 |
|
|a DEBBG
|b BV044153573
|
029 |
1 |
|
|a DEBSZ
|b 36007863X
|
029 |
1 |
|
|a DEBSZ
|b 372695582
|
029 |
1 |
|
|a DEBSZ
|b 430979436
|
029 |
1 |
|
|a DEBSZ
|b 481266801
|
029 |
1 |
|
|a NZ1
|b 15189609
|
029 |
1 |
|
|a NZ1
|b 15952545
|
035 |
|
|
|a (OCoLC)722800241
|z (OCoLC)721194746
|z (OCoLC)726757691
|z (OCoLC)768975514
|
037 |
|
|
|a 2BD7DD6D-6FAA-4976-89DB-8C8A85250313
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.585
|b .W56 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Winkler, J. R.
|q (Joachim R.)
|
245 |
1 |
0 |
|a Securing the cloud :
|b cloud computer security techniques and tactics /
|c J.R. "Vic" Winkler.
|
260 |
|
|
|a Burlington, MA :
|b Elsevier,
|c 2011.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage.
|
505 |
0 |
|
|a Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Winkler, J.R. (Joachim R.).
|t Securing the cloud.
|d Burlington, MA : Elsevier, 2011
|z 9781597495929
|w (DLC) 2011012004
|w (OCoLC)660546140
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365857
|z Texto completo
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 17857024
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL686827
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10467735
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 365857
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 5049400
|
994 |
|
|
|a 92
|b IZTAP
|