|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn893919824 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141028s2015 maua ob 001 0 eng |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d YDXCP
|d UIU
|d WAU
|d DEBBG
|d EBLCP
|d N$T
|d E7B
|d TEFOD
|d B24X7
|d COO
|d RIV
|d DEBSZ
|d TEFOD
|d OCLCQ
|d AUD
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d OCLCF
|d U3W
|d D6H
|d CEF
|d INT
|d OCLCQ
|d WYU
|d UAB
|d VT2
|d OCLCQ
|d MM9
|d UX1
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 891449795
|a 1066457399
|a 1167611198
|a 1192342920
|a 1235117971
|
020 |
|
|
|a 9780124201859
|
020 |
|
|
|a 0124201857
|
020 |
|
|
|a 0124201253
|
020 |
|
|
|a 9780124201255
|
020 |
|
|
|z 9780124201255
|
029 |
1 |
|
|a AU@
|b 000054998645
|
029 |
1 |
|
|a AU@
|b 000059221948
|
029 |
1 |
|
|a AU@
|b 000065316801
|
029 |
1 |
|
|a CHNEW
|b 000888878
|
029 |
1 |
|
|a CHNEW
|b 001001058
|
029 |
1 |
|
|a CHNEW
|b 001026536
|
029 |
1 |
|
|a DEBBG
|b BV042489963
|
029 |
1 |
|
|a DEBBG
|b BV043612576
|
029 |
1 |
|
|a DEBSZ
|b 431785163
|
029 |
1 |
|
|a DEBSZ
|b 434138673
|
029 |
1 |
|
|a DEBSZ
|b 434831441
|
029 |
1 |
|
|a GBVCP
|b 825921104
|
035 |
|
|
|a (OCoLC)893919824
|z (OCoLC)891449795
|z (OCoLC)1066457399
|z (OCoLC)1167611198
|z (OCoLC)1192342920
|z (OCoLC)1235117971
|
037 |
|
|
|a CL0500000495
|b Safari Books Online
|
037 |
|
|
|a 9629A6D0-B01A-45DE-83E7-2279D1EFD294
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.585
|b .S36 2015
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Samani, Raj,
|e author.
|
245 |
1 |
0 |
|a CSA guide to cloud computing :
|b implementing cloud privacy and security /
|c Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor.
|
246 |
3 |
|
|a Cloud Security Alliance guide to cloud computing
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c ©2015.
|
300 |
|
|
|a 1 online resource (xx, 216 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Front Cover; CSA Guide to Cloud: Computing Implementing Cloud Privacy and Security; Copyright; Contents; Forewords; Partner, Ridge Schmidt Cyber, ; About the Authors; RAJ SAMANI; BRIAN HONAN; JIM REAVIS; About the Cloud Security Alliance; HISTORY; Acknowledgments; CSA Guide to Cloud Computing-Introduction; HOW THIS BOOK IS STRUCTURED; Chapter 1 -- Cloud Computing, What is it and What's the Big Deal?; DEFINING CLOUD COMPUTING; ECONOMIC OPPORTUNITIES FOR CLOUD COMPUTING; THE CLOUD IS "NOT" SECURE; END NOTES; Chapter 2 -- Selecting and Engaging with a Cloud Service Provider.
|
505 |
8 |
|
|a SECURITY, TRUST AND ASSURANCE REPOSITORY INITIATIVEENGAGING WITH THE CLOUD SERVICE PROVIDER; END NOTES; Chapter 3 -- The Cloud Threat Landscape; THE CLOUD THREAT LANDSCAPE; NOTORIOUS NINE; ADDITIONAL CLOUD THREATS; END NOTES; Chapter 4 -- Secure Cloud for Mobile Computing; MOBILE TOP THREATS: EVIL 8.0; ADDRESSING THE THREAT: MOBILE COMPONENTS; END NOTES; Chapter 5 -- Making the Move into the Cloud; CLOUD COMPUTING CHECKLIST; SECURITY FOR THE CLOUD; END NOTES; Chapter 6 -- Certification for Cloud Service Providers; Certification for Cloud Service Providers; END NOTES.
|
505 |
8 |
|
|a Chapter 7 -- The Privacy ImperativeDOES CLOUD COMPUTING MAKE MY DATA ANY LESS PRIVATE?; PRIVACY LEVEL AGREEMENT; DATA PROTECTION CERTIFICATION; END NOTES; Chapter 8 -- Cloud Security Alliance Research; BIG DATA WORKING GROUP; CLOUD DATA GOVERNANCE; CLOUDCERT; CLOUDTRUST PROTOCOL; ENTERPRISE ARCHITECTURE WORKING GROUP; INCIDENT MANAGEMENT AND FORENSICS; INNOVATION INITIATIVE; SECURITY AS A SERVICE; SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS; SOFTWARE DEFINED PERIMETER; END NOTES; Chapter 9 -- Dark Clouds, What to Do In The Event of a Security Incident.
|
505 |
8 |
|
|a BUILDING A SECURITY INCIDENT RESPONSE TEAMINCIDENT RESPONSE CHALLENGES IN THE CLOUD; THE FUTURE; END NOTES; Chapter 10 -- The Future Cloud; MORE, MORE, AND MORE; CLOUD COMPUTING FOR CRITICAL INFRASTRUCTURE; DEFINING THE SECURITY REQUIREMENTS FOR TOMORROW'S CLOUD; END NOTES; Appendix; AUTHENTICATION BYPASS; Index.
|
520 |
|
|
|a CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing prov.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
4 |
|a Llibres electrònics.
|
700 |
1 |
|
|a Honan, Brian,
|e author.
|
700 |
1 |
|
|a Reavis, Jim,
|e author.
|
700 |
1 |
|
|a Jirasek, Vladimir,
|e editor.
|
710 |
2 |
|
|a CSA (Organization),
|e issuing body.
|
776 |
0 |
8 |
|i Print version:
|a Samani, Raj.
|t CSA guide to cloud computing.
|d Amsterdam ; Boston : Syngress, an imprint of Elsevier, [2014]
|z 9780124201255
|w (DLC) 2014031206
|w (OCoLC)884310339
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124201255/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00073406
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1793946
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10938970
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 854570
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12091140
|
994 |
|
|
|a 92
|b IZTAP
|