|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1096507390 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m eo d |
007 |
cr cn||||m|||a |
008 |
190331s2019 nyu ob 001 0 eng d |
040 |
|
|
|a NYMPP
|b eng
|e rda
|e pn
|c NYMPP
|d OCLCO
|d DKU
|d UKAHL
|d OCLCF
|d OCLCQ
|d N$T
|d YDXIT
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1097252922
|
020 |
|
|
|a 9781949449242
|q (electronic book)
|
020 |
|
|
|a 1949449246
|q (electronic book)
|
020 |
|
|
|z 1949449238
|q (paperback)
|
020 |
|
|
|z 9781949449235
|q (paperback)
|
035 |
|
|
|a (OCoLC)1096507390
|z (OCoLC)1097252922
|
050 |
|
4 |
|a QA76.585
|b .D34 2019
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a D'Agostino, Giulio,
|e author.
|
245 |
1 |
0 |
|a Data security in cloud computing.
|n Volume ii /
|c Giulio D'Agostino.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York, New York :
|b Momentum Press,
|c 2019.
|
300 |
|
|
|a 1 online resource (135 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 isbdmedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Computer engineering foundations currents and trajectories collection
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Chapter 7. Secure cloud architecture. 7.1. Governance and comprehensive risk analysis -- Chapter 8. Risk and trust assessment -- Chapter 9. Managing risk in the cloud -- 10.1. Improvements ; 10.2. Multilevel authentication ; 10.3. Encryption ; 10.4. Password administration ; 10.5. Distributed servers -- Chapter 11. Cloud security risk management. 11.1. Risk in the cloud ; 11.2. Indirect measurements and metrics ; 11.3. Definitions of risk ; 11.4. Risk and cloud. 11.4.1. Security risks not particular to cloud computing ; 11.4.2. Cloud-specific hazards ; 11.4.3. Safety SLA for cloud services -- Chapter 12. Infrastructure-as-a-service (IAAS). 12.1. Considerations ; 12.2. Network ; 12.3. Security implications ; 12.4. Storage ; 12.5. Databases ; 12.6. Control -- Chapter 13. Cryptographic key management for data protection. 13.1. Key management system design dhoices ; 13.2. Cloud key management challenges ; 13.3. Cloud key management strategies ; 13.3.1. Establish trust in crypto module ; 13.3.2. Use key splitting techniques -- Chapter 14. Managing legal compliance risk and personal data protection. 14.1. Digital agenda for Europe ; 14.2. Addressing legal compliance ; 14.2.1. Precontractual phase ; 14.2.2. Step 1: Precontractual phase ; 14.2.3. Risks and opportunities for your cloud service client ; 14.2.4. Outsourcing cloud services ; 14.2.5. Step 2: Major issues in entering a cloud service contract ; 14.2.6. Jurisdiction and applicable law ; 14.2.7. Privacy roles ; 14.2.8. Amendments to the contract ; 14.2.9. Data location and transfers of data ; 14.2.10. Processing of personal data by subcontractors ; 14.2.11. Data subjects' rights (intervenability) ; 14.2.12. Step 3: Exiting a cloud service contract: major issues ; 14.2.13. Lock-in and interoperability ; 14.2.14. Service-level agreements ; 14.2.15. Termination of the contract -- Chapter 15. Future directions in cloud computing security. 15.1. Categories.
|
520 |
3 |
|
|a This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions required to rap- idly reap its benefits while at the same time lowering IT implementation risk. The book's content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on March 20, 2020).
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
653 |
|
|
|a Amazon Web Services
|
653 |
|
|
|a API.
|
653 |
|
|
|a Azure.
|
653 |
|
|
|a BaaS.
|
653 |
|
|
|a Cloud computing.
|
653 |
|
|
|a Computer engineering and science.
|
653 |
|
|
|a Google Cloud.
|
653 |
|
|
|a Java.
|
653 |
|
|
|a MySQL.
|
653 |
|
|
|a Node.js.
|
653 |
|
|
|a SaaS.
|
653 |
|
|
|a SQL.=655 0
|a Electronic books
|
776 |
0 |
8 |
|i Print version:
|z 9781949449235
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2034765
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35970893
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2034765
|
938 |
|
|
|a Momentum Press
|b NYMP
|n 9781949449242
|
994 |
|
|
|a 92
|b IZTAP
|