|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn700706557 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
110205s2010 xx o 000 0 eng d |
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d EBLCP
|d STF
|d OCLCQ
|d E7B
|d B24X7
|d N$T
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d UMI
|d JSTOR
|d YDXCP
|d OCLCQ
|d COO
|d OCLCQ
|d AGLDB
|d Z5A
|d LIV
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d OCLCF
|d EZ9
|d JBG
|d VTS
|d CEF
|d OCLCQ
|d LVT
|d UAB
|d M8D
|d VT2
|d OCLCQ
|d MM9
|d UX1
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 857716876
|a 1103270519
|a 1153051145
|a 1175644302
|a 1192338861
|a 1240537568
|
020 |
|
|
|a 9781849280914
|q (electronic bk.)
|
020 |
|
|
|a 1849280916
|q (electronic bk.)
|
020 |
|
|
|z 9781849280907
|
020 |
|
|
|z 1849280908
|
029 |
1 |
|
|a AU@
|b 000051452901
|
029 |
1 |
|
|a AU@
|b 000052007662
|
029 |
1 |
|
|a AU@
|b 000067097763
|
029 |
1 |
|
|a DEBBG
|b BV041432045
|
029 |
1 |
|
|a DEBBG
|b BV043039455
|
029 |
1 |
|
|a DEBSZ
|b 372699871
|
029 |
1 |
|
|a DEBSZ
|b 396943586
|
029 |
1 |
|
|a DEBSZ
|b 398279357
|
029 |
1 |
|
|a DEBSZ
|b 42152930X
|
029 |
1 |
|
|a GBVCP
|b 785452273
|
035 |
|
|
|a (OCoLC)700706557
|z (OCoLC)857716876
|z (OCoLC)1103270519
|z (OCoLC)1153051145
|z (OCoLC)1175644302
|z (OCoLC)1192338861
|z (OCoLC)1240537568
|
037 |
|
|
|a CL0500000277
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5mq1
|b JSTOR
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Blount, Sumner.
|
245 |
1 |
0 |
|a Cloud Security and Governance :
|b Who's on your cloud?.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2010.
|
300 |
|
|
|a 1 online resource (58 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES.
|
520 |
|
|
|a This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Zanella, Rob.
|
776 |
0 |
8 |
|i Print version:
|a Blount, Sumner.
|t Cloud Security and Governance : Who's on your cloud?
|d Ely : IT Governance Publishing, ©2010
|z 9781849280907
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh63p
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00037795
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391120
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3615242
|
994 |
|
|
|a 92
|b IZTAP
|