|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn959277888 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
160927t20172017flu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d IDEBK
|d YDX
|d NRC
|d UMI
|d CRCPR
|d STF
|d DEBBG
|d OCLCO
|d IUL
|d MFS
|d OSU
|d OCLCQ
|d UAB
|d UPM
|d OCLCA
|d COO
|d OCLCQ
|d OCLCO
|d OCLCA
|d CNCGM
|d OCLCF
|d OCLCQ
|d CEF
|d KSU
|d EZ9
|d RRP
|d VT2
|d OCLCQ
|d U3W
|d OCLCA
|d UKMGB
|d OCLCQ
|d LVT
|d TKN
|d TYFRS
|d WYU
|d C6I
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d NLW
|d COD
|d OCLCA
|d OCLCO
|d OCLCQ
|d SFB
|d INARC
|d OCLCQ
|
016 |
7 |
|
|a 018231586
|2 Uk
|
019 |
|
|
|a 959951221
|a 961310499
|a 963356241
|a 964653167
|a 965383083
|a 965534648
|a 1000440831
|a 1015207984
|a 1032680224
|a 1048191986
|a 1066669830
|a 1076773254
|a 1103270633
|a 1129332767
|
020 |
|
|
|a 9781482260953
|q (electronic bk.)
|
020 |
|
|
|a 1482260956
|q (electronic bk.)
|
020 |
|
|
|z 9781482260946
|q (hardcover)
|
020 |
|
|
|z 1482260948
|q (hardcover)
|
020 |
|
|
|z 9781315354927
|
020 |
|
|
|z 1315354926
|
020 |
|
|
|z 1315335867
|
020 |
|
|
|z 1315372118
|
029 |
1 |
|
|a AU@
|b 000065180950
|
029 |
1 |
|
|a DEBBG
|b BV043970573
|
029 |
1 |
|
|a DEBSZ
|b 485810484
|
029 |
1 |
|
|a GBVCP
|b 882761536
|
029 |
1 |
|
|a UKMGB
|b 018231586
|
035 |
|
|
|a (OCoLC)959277888
|z (OCoLC)959951221
|z (OCoLC)961310499
|z (OCoLC)963356241
|z (OCoLC)964653167
|z (OCoLC)965383083
|z (OCoLC)965534648
|z (OCoLC)1000440831
|z (OCoLC)1015207984
|z (OCoLC)1032680224
|z (OCoLC)1048191986
|z (OCoLC)1066669830
|z (OCoLC)1076773254
|z (OCoLC)1103270633
|z (OCoLC)1129332767
|
037 |
|
|
|a CL0500000805
|b Safari Books Online
|
050 |
|
4 |
|a QA76.585
|b .C5825 2017eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cloud computing security :
|b foundations and challenges /
|c edited by John R. Vacca.
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (xxv, 492 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. -- Provided by publisher.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Cloud Computing
|2 gnd
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
700 |
1 |
|
|a Vacca, John R.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Cloud computing security.
|d Boca Raton : CRC Press, 2017
|z 9781482260946
|w (DLC) 2016009645
|w (OCoLC)949552732
|
830 |
|
0 |
|a Online access with DDA: Askews (Maths)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781315354927/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n isbn_9781482260946
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH31442567
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30326394
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1357309
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis32958654
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9781315372112
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13116938
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12622877
|
994 |
|
|
|a 92
|b IZTAP
|