|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn799769042 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
120716s2012 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d B24X7
|d N15
|d OCLCO
|d COO
|d OCLCQ
|d YDXCP
|d N$T
|d UMI
|d OCLCO
|d OCLCQ
|d IAD
|d KNOVL
|d DEBSZ
|d OCLCF
|d JSTOR
|d KNOVL
|d OCLCQ
|d KNOVL
|d OCLCQ
|d AGLDB
|d Z5A
|d LIV
|d MERUC
|d OCLCQ
|d EZ9
|d IYU
|d IOG
|d VNS
|d VTS
|d CEF
|d OCLCQ
|d XC$
|d LVT
|d UAB
|d STF
|d M8D
|d UKAHL
|d OCLCQ
|d VT2
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 857306735
|
020 |
|
|
|a 9781849283601
|q (electronic bk.)
|
020 |
|
|
|a 1849283605
|q (electronic bk.)
|
020 |
|
|
|a 9781628700114
|q (electronic bk.)
|
020 |
|
|
|a 1628700114
|q (electronic bk.)
|
020 |
|
|
|a 9781849283618
|
020 |
|
|
|a 1849283613
|
020 |
|
|
|z 1849283591
|
020 |
|
|
|z 9781849283595
|
029 |
1 |
|
|a AU@
|b 000052007537
|
029 |
1 |
|
|a DEBBG
|b BV041431776
|
029 |
1 |
|
|a DEBBG
|b BV042961220
|
029 |
1 |
|
|a DEBSZ
|b 397311729
|
029 |
1 |
|
|a DEBSZ
|b 398276404
|
029 |
1 |
|
|a DEBSZ
|b 421257679
|
029 |
1 |
|
|a AU@
|b 000067109561
|
035 |
|
|
|a (OCoLC)799769042
|z (OCoLC)857306735
|
037 |
|
|
|a CL0500000268
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5ppf
|b JSTOR
|
050 |
|
4 |
|a HF5548.37 .C384 2012
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM060080
|2 bisacsh
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Carstensen, Jared.
|
245 |
1 |
0 |
|a Cloud Computing :
|b Assessing the Risks.
|
260 |
|
|
|a Ely :
|b IT Governance Publishing,
|c 2012.
|
300 |
|
|
|a 1 online resource (297 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three.
|
505 |
8 |
|
|a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism.
|
505 |
8 |
|
|a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility.
|
505 |
8 |
|
|a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work.
|
505 |
8 |
|
|a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing.
|
520 |
|
|
|a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Web services.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Services Web.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Web
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
650 |
|
7 |
|a Web services.
|2 fast
|0 (OCoLC)fst01173242
|
700 |
1 |
|
|a Morgenthal, JP.
|
700 |
1 |
|
|a Golden, Bernard.
|
776 |
0 |
8 |
|i Print version:
|a Carstensen, Jared.
|t Cloud Computing : Assessing the Risks.
|d Ely : IT Governance Publishing, ©2012
|z 9781849283595
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh5bm
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26183768
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00047045
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL918802
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571554
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9241861
|
994 |
|
|
|a 92
|b IZTAP
|