|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
KNOVEL_ocn833573779 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
130221s2012 enka ob 000 0 eng d |
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c STF
|d OCLCO
|d B24X7
|d N$T
|d MHW
|d YDXCP
|d UMI
|d COO
|d KNOVL
|d DEBSZ
|d JSTOR
|d KNOVL
|d OCLCQ
|d AGLDB
|d LIV
|d MERUC
|d OCLCQ
|d JBG
|d IOG
|d OCLCA
|d OCLCF
|d VTS
|d CEF
|d OCLCQ
|d LVT
|d STF
|d UAB
|d M8D
|d WAU
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 856889475
|
020 |
|
|
|a 9781849283977
|q (electronic bk.)
|
020 |
|
|
|a 1849283974
|q (electronic bk.)
|
020 |
|
|
|a 9781628700190
|q (electronic bk.)
|
020 |
|
|
|a 162870019X
|q (electronic bk.)
|
020 |
|
|
|a 9781849283984
|
020 |
|
|
|a 1849283982
|
020 |
|
|
|z 1849283966
|
020 |
|
|
|z 9781849283960
|
029 |
1 |
|
|a AU@
|b 000052006752
|
029 |
1 |
|
|a AU@
|b 000052918040
|
029 |
1 |
|
|a AU@
|b 000053734644
|
029 |
1 |
|
|a AU@
|b 000060585094
|
029 |
1 |
|
|a AU@
|b 000065313121
|
029 |
1 |
|
|a DEBBG
|b BV041431800
|
029 |
1 |
|
|a DEBBG
|b BV043101820
|
029 |
1 |
|
|a DEBSZ
|b 397540302
|
029 |
1 |
|
|a DEBSZ
|b 398276676
|
029 |
1 |
|
|a DEBSZ
|b 421257636
|
035 |
|
|
|a (OCoLC)833573779
|z (OCoLC)856889475
|
037 |
|
|
|a CL0500000269
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5fdf
|b JSTOR
|
050 |
|
4 |
|a QA76.585
|b .N49 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Newcombe, Lee,
|e author.
|
245 |
1 |
0 |
|a Securing cloud services :
|b a pragmatic approach to security architecture in the cloud /
|c Lee Newcombe.
|
260 |
|
|
|a Ely, Cambridgeshire, U.K. :
|b IT Governance Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource (329 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.
|
505 |
0 |
|
|a Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Web services
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Services Web
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Newcombe, Lee.
|t Securing cloud services.
|d Ely, Cambridgeshire : IT Governance, 2012
|z 9781849283960
|w (OCoLC)851639721
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpSCSAPAS4/toc
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00050156
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571569
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10678287
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1186309
|
994 |
|
|
|a 92
|b IZTAP
|