Cargando…

Cloud computing security : foundations and challenges /

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Vacca, John R. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, [2017]
Colección:Online access with DDA: Askews (Maths)
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn959277888
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 160927t20172017flu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d YDX  |d NRC  |d UMI  |d CRCPR  |d STF  |d DEBBG  |d OCLCO  |d IUL  |d MFS  |d OSU  |d OCLCQ  |d UAB  |d UPM  |d OCLCA  |d COO  |d OCLCQ  |d OCLCO  |d OCLCA  |d CNCGM  |d OCLCF  |d OCLCQ  |d CEF  |d KSU  |d EZ9  |d RRP  |d VT2  |d OCLCQ  |d U3W  |d OCLCA  |d UKMGB  |d OCLCQ  |d LVT  |d TKN  |d TYFRS  |d WYU  |d C6I  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d NLW  |d COD  |d OCLCA  |d OCLCO  |d OCLCQ  |d SFB  |d INARC  |d OCLCQ 
016 7 |a 018231586  |2 Uk 
019 |a 959951221  |a 961310499  |a 963356241  |a 964653167  |a 965383083  |a 965534648  |a 1000440831  |a 1015207984  |a 1032680224  |a 1048191986  |a 1066669830  |a 1076773254  |a 1103270633  |a 1129332767 
020 |a 9781482260953  |q (electronic bk.) 
020 |a 1482260956  |q (electronic bk.) 
020 |z 9781482260946  |q (hardcover) 
020 |z 1482260948  |q (hardcover) 
020 |z 9781315354927 
020 |z 1315354926 
020 |z 1315335867 
020 |z 1315372118 
029 1 |a AU@  |b 000065180950 
029 1 |a DEBBG  |b BV043970573 
029 1 |a DEBSZ  |b 485810484 
029 1 |a GBVCP  |b 882761536 
029 1 |a UKMGB  |b 018231586 
035 |a (OCoLC)959277888  |z (OCoLC)959951221  |z (OCoLC)961310499  |z (OCoLC)963356241  |z (OCoLC)964653167  |z (OCoLC)965383083  |z (OCoLC)965534648  |z (OCoLC)1000440831  |z (OCoLC)1015207984  |z (OCoLC)1032680224  |z (OCoLC)1048191986  |z (OCoLC)1066669830  |z (OCoLC)1076773254  |z (OCoLC)1103270633  |z (OCoLC)1129332767 
037 |a CL0500000805  |b Safari Books Online 
050 4 |a QA76.585  |b .C5825 2017eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Cloud computing security :  |b foundations and challenges /  |c edited by John R. Vacca. 
264 1 |a Boca Raton :  |b CRC Press,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (xxv, 492 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide. -- Provided by publisher. 
504 |a Includes bibliographical references and index. 
505 0 |a Cloud computing essentials / Anna Squicciarini, Daniela Oliveira, and Dan Lin -- Overview of cloud computing / William Stallings -- Cloud security baselines / Daniela Oliveira, Anna Squicciarini, and Dan Lin -- Cloud security, privacy, and trust baselines / Nikolaos Pitropakis, Sokratis K. Katsikas, and Costas Lambrinoudakis -- Infrastructure as a service (IaaS) / Mario Santana -- Risk and trust assessment: schemes for cloud services / Erdal Cayirci -- Managing risk in the cloud / Michaela Iorga and Anil Karmel -- Cloud security risk management / Marco Cremonini -- Secure cloud risk management: risk mitigation methods / James T. Harmening -- Specification and enforcement of access policies in emerging scenarios / Sabrina de Capitani di Vimercati, Sara Foresti, and Pierangela Samarati -- Cryptographic key management for data protection / Sarbari Gupta -- Cloud security access control: distributed access control / James T. Harmening and Randall DeVitto -- Cloud security key management: cloud user controls / Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel -- Cloud computing architecture and security concepts / Pramod Pandya and Riad Rahmo -- Secure cloud architecture / Pramod Pandya -- Locking down cloud servers / Thorsten Herre -- Third-party providers integrity assurance for data outsourcing / Jiawei Yuan and Shucheng Yu -- Negotiating cloud security requirements with vendors / Daniel S. Soper -- Managing legal compliance risk in the cloud and negotiating personal data protection requirements with vendors / Paolo Balboni -- Integrity assurance for data outsourcing / Reza Curtmola and Bo Chen -- Secure computation outsourcing / Shams Zawoad and Ragib Hasan -- Computation over encrypted data / Feng-Hao Liu -- Trusted computing technology / Felipe E. Medina -- Computing technology for trusted cloud security / Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini -- Trusted computing technology and proposals for resolving cloud computing security problems / Tao Su, Antonio Lioy, and Nicola Barresi -- Assuring compliance with governement certification and accreditation regulations / Sarbari Gupta -- Government certification, accreditation, regulations, and compliance risks / Thorsten Herre -- Simplifying secure cloud computing environments with cloud data centers / Thorsten Herre -- Availability, recovery, and auditing across data centers / Reza Curtmola and Bo Chen -- Advanced security architectures for cloud computing / Albert Caballero -- Side-channel attacks and defenses on cloud traffic / Wen Ming Liu and Lingyu Wang -- Clouds are evil / John Strand -- Future directions in cloud computing security: risks and challenges / Mohammad Kamrul Islam and Rasib Khan. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Cloud Computing  |2 gnd 
650 7 |a Datensicherung  |2 gnd 
700 1 |a Vacca, John R.,  |e editor. 
776 0 8 |i Print version:  |t Cloud computing security.  |d Boca Raton : CRC Press, 2017  |z 9781482260946  |w (DLC) 2016009645  |w (OCoLC)949552732 
830 0 |a Online access with DDA: Askews (Maths) 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781315354927/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n isbn_9781482260946 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31442567 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30326394 
938 |a EBSCOhost  |b EBSC  |n 1357309 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis32958654 
938 |a Taylor & Francis  |b TAFR  |n 9781315372112 
938 |a YBP Library Services  |b YANK  |n 13116938 
938 |a YBP Library Services  |b YANK  |n 12622877 
994 |a 92  |b IZTAP