|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1152242704 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d | |
007 |
cr ||||||||||| |
008 |
200218s2020 enka fob 000 0 eng d |
040 |
|
|
|a UKAHL
|b eng
|e rda
|c UKAHL
|d YDX
|d EBLCP
|d JSTOR
|d OCLCF
|d UX1
|d OCLCO
|d ANV
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1150235894
|a 1151189441
|a 1175639111
|a 1190729242
|
020 |
|
|
|a 9781787782068
|q (e-book)
|
020 |
|
|
|a 1787782069
|q (e-book)
|
020 |
|
|
|z 9781787782051
|q (paperback)
|
020 |
|
|
|z 1787782050
|q (paperback)
|
020 |
|
|
|z 9781787782075 (ePub ebook)
|
029 |
1 |
|
|a AU@
|b 000067092237
|
035 |
|
|
|a (OCoLC)1152242704
|z (OCoLC)1150235894
|z (OCoLC)1151189441
|z (OCoLC)1175639111
|z (OCoLC)1190729242
|
037 |
|
|
|a 22573/ctvwf5xwv
|b JSTOR
|
050 |
|
4 |
|a QA76.585
|b .N49 2020eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Newcombe, Lee,
|e author.
|
245 |
1 |
0 |
|a Securing cloud services :
|b a pragmatic guide /
|c Lee Newcombe.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Ely, Cambridgeshire :
|b IT Governance Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (453 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b n
|2 rdamedia
|
338 |
|
|
|a online resource
|b nc
|2 rdacarrier
|
505 |
0 |
|
|a Part 1: Securing Cloud Services – setting the scene. Introduction ; ch. 1: Introduction to cloud computing ; ch. 2: Overview of existing cloud taxonomies and models ; ch. 3: The security balance ; ch. 4: Security threats associated with cloud computing ; ch. 5: Privacy and regulatory concerns -- Part 2: Securing Cloud Services – in practice. Introduction ; ch. 6: Introduction to security architecture ; ch. 7: Application of security architecture to cloud computing ; ch. 8: Security and the cloud ; ch. 9: Security and infrastructure as a service ; ch. 10: Security and platform as a service ; ch. 11: Security and software as a service ; ch. 12: Security and function as a service -- Part 3: Conclusion. Introduction ; ch. 13: Looking ahead ; ch. 14: Conclusion and summary.
|
520 |
|
|
|a Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a Knovel
|b ACADEMIC - General Engineering & Project Administration
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Web services
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Services Web
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Newcombe, Lee
|t Securing Cloud Services : A Pragmatic Approach, Second Edition
|d Ely : IT Governance Ltd,c2020
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpSCSAPGE1/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37236175
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301212160
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6167502
|
994 |
|
|
|a 92
|b IZTAP
|