Cargando…

Cloud security and privacy /

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mather, Tim
Otros Autores: Kumaraswamy, Subra, Latif, Shahed
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Beijing ; Cambridge [Mass.] : O'Reilly, ©2009.
Edición:1st ed.
Colección:Theory in practice (Sebastopol, Calif.)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn496000431
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 100106s2009 cc a ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d CEF  |d OCLCQ  |d CUS  |d DEBSZ  |d N$T  |d TEFOD  |d YDXCP  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCA  |d FEM  |d OCLCQ  |d OCLCF  |d OCLCA  |d MOQ  |d WYU  |d UKAHL  |d VT2  |d UHL  |d UKSSU  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA976752  |2 bnb 
016 7 |a 015341699  |2 Uk 
019 |a 469815943  |a 777400417  |a 780026836  |a 968118623  |a 969021822  |a 1044248030  |a 1056352043  |a 1060865057  |a 1062888005  |a 1073062150  |a 1103270216  |a 1113672385  |a 1129342583  |a 1153045507  |a 1154895126  |a 1192330720  |a 1240531154  |a 1244513594 
020 |a 9781449391881  |q (electronic bk.) 
020 |a 1449391885  |q (electronic bk.) 
020 |a 9781449379513  |q (electronic bk.) 
020 |a 1449379516  |q (electronic bk.) 
020 |z 9780596806453 
020 |z 0596806450 
020 |z 9780596802769  |q (pbk.) 
020 |z 0596802765  |q (pbk.) 
029 1 |a AU@  |b 000046437809 
029 1 |a AU@  |b 000062580495 
029 1 |a AU@  |b 000066230182 
029 1 |a CHBIS  |b 006152204 
029 1 |a CHVBK  |b 171343433 
029 1 |a DEBSZ  |b 355423510 
029 1 |a HEBIS  |b 291495087 
035 |a (OCoLC)496000431  |z (OCoLC)469815943  |z (OCoLC)777400417  |z (OCoLC)780026836  |z (OCoLC)968118623  |z (OCoLC)969021822  |z (OCoLC)1044248030  |z (OCoLC)1056352043  |z (OCoLC)1060865057  |z (OCoLC)1062888005  |z (OCoLC)1073062150  |z (OCoLC)1103270216  |z (OCoLC)1113672385  |z (OCoLC)1129342583  |z (OCoLC)1153045507  |z (OCoLC)1154895126  |z (OCoLC)1192330720  |z (OCoLC)1240531154  |z (OCoLC)1244513594 
037 |a CL0500000054  |b Safari Books Online 
037 |a 114FE899-E392-40C7-B0D5-70C2B6616BC0  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .M38 2009 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Mather, Tim. 
245 1 0 |a Cloud security and privacy /  |c Tim Mather, Subra Kumaraswamy, and Shahed Latif. 
250 |a 1st ed. 
260 |a Beijing ;  |a Cambridge [Mass.] :  |b O'Reilly,  |c ©2009. 
300 |a 1 online resource (xvii, 312 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Theory in practice 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud. 
588 0 |a Print version record. 
520 |a You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security<p. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cloud computing  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Cloud computing  |x Security measures.  |2 blmlsh 
650 7 |a Réseaux informatiques.  |2 eclas 
650 7 |a Informatique en nuage.  |2 eclas 
650 7 |a Technologies de l'information et de la communication.  |2 eclas 
650 7 |a Sécurité informatique.  |2 eclas 
650 7 |a Délits informatiques.  |2 eclas 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Cloud Computing  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Sicherheitsmassnahme.  |2 swd 
700 1 |a Kumaraswamy, Subra. 
700 1 |a Latif, Shahed. 
776 0 8 |i Print version:  |z 9780596802769 
830 0 |a Theory in practice (Sebastopol, Calif.) 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780596806453/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26833684 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26833777 
938 |a EBSCOhost  |b EBSC  |n 414816 
938 |a Internet Archive  |b INAR  |n cloudsecuritypri0000math 
938 |a YBP Library Services  |b YANK  |n 7471052 
938 |a YBP Library Services  |b YANK  |n 7481253 
994 |a 92  |b IZTAP