|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn905853395 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150330s2015 nyua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d B24X7
|d STF
|d DEBBG
|d DEBSZ
|d COO
|d LIV
|d OCLCF
|d CEF
|d OCLCA
|d VT2
|d WYU
|d AU@
|d RDF
|d SOE
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 907358761
|a 913462174
|a 1287873134
|
020 |
|
|
|a 0738440353
|
020 |
|
|
|a 9780738440354
|
020 |
|
|
|z 9780738440354
|
029 |
1 |
|
|a DEBBG
|b BV042682549
|
029 |
1 |
|
|a DEBSZ
|b 446577456
|
029 |
1 |
|
|a GBVCP
|b 83215752X
|
035 |
|
|
|a (OCoLC)905853395
|z (OCoLC)907358761
|z (OCoLC)913462174
|z (OCoLC)1287873134
|
037 |
|
|
|a CL0500000572
|b Safari Books Online
|
050 |
|
4 |
|a QA76.585
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bücker, Axel,
|e author.
|
245 |
1 |
0 |
|a Cloud security guidelines for IBM power systems /
|c Axel Buecker ... [and four others].
|
246 |
3 |
0 |
|a Cloud security guidelines for International Business Machines power systems
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Poughkeepsie, NY :
|b IBM Corp., International Technical Support Organization,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a IBM redbooks
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed March 24, 2015).
|
504 |
|
|
|a Includes bibliographical references.
|
500 |
|
|
|a Number on resource description page: SG24-8242-00.
|
520 |
|
|
|a This book covers cloud security considerations for IBM Power Systems. The first objectives are to examine how Power Systems can fit into the current and developing cloud computing landscape and to outline the proven Cloud Computing Reference Architecture (CCRA) that IBM employs in building private and hybrid cloud environments. It then examines the underlying technology and hones in on the security aspects for the following subsystems: IBM Hardware Management Console, IBM PowerVM, IBM PowerKVM, IBM PowerVC, and IBM Cloud Manager with OpenStack. --
|c Edited summary from book.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Computer architecture.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Ordinateurs
|x Architecture.
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer architecture
|2 fast
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization.
|
776 |
0 |
8 |
|i Print version:
|a Bücker, Axel.
|t Cloud security guidelines for IBM power systems.
|d [Poughkeepsie, New York] : IBM Corporation, International Technical Support Organization, 2015
|z 9780738440354
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738440353/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00082335
|
994 |
|
|
|a 92
|b IZTAP
|