|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1284932821 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
211109s2022 nju ob 001 0 eng d |
040 |
|
|
|a DG1
|b eng
|e rda
|e pn
|c DG1
|d YDX
|d OCLCF
|d UKMGB
|d UKAHL
|d OCLCO
|d ORMDA
|d OCLCQ
|d N$T
|d TEFOD
|d OCLCO
|d IEEEE
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC1J7667
|2 bnb
|
016 |
7 |
|
|a 020376663
|2 Uk
|
019 |
|
|
|a 1281583393
|a 1281651454
|a 1281770981
|
020 |
|
|
|a 9781119695158
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 1119695155
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 9781119692317
|q (electronic bk.)
|
020 |
|
|
|a 1119692318
|q (electronic bk.)
|
020 |
|
|
|a 9781119693017
|q (electronic bk.)
|
020 |
|
|
|a 1119693012
|q (electronic bk.)
|
020 |
|
|
|z 1119692326
|
020 |
|
|
|z 9781119692324
|
024 |
7 |
|
|a 10.1002/9781119695158
|2 doi
|
029 |
1 |
|
|a AU@
|b 000070261779
|
029 |
1 |
|
|a UKMGB
|b 020376663
|
035 |
|
|
|a (OCoLC)1284932821
|z (OCoLC)1281583393
|z (OCoLC)1281651454
|z (OCoLC)1281770981
|
037 |
|
|
|a 9781119692317
|b Wiley
|
037 |
|
|
|a 9781119692324
|b O'Reilly Media
|
037 |
|
|
|a FFEC8A61-9621-4ADB-B0DF-5A825FE8C62B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9820891
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bursell, Mike,
|e author.
|
245 |
1 |
0 |
|a Trust in computer systems and the cloud /
|c Mike Bursell.
|
264 |
|
1 |
|a Hoboken, NJ :
|b Wiley,
|c [2022]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Front Matter -- Why Trust? -- Humans and Trust -- Trust Operations and Alternatives -- Defining Trust in Computing -- The Importance of Systems -- Blockchain and Trust -- The Importance of Time -- Systems and Trust -- Open Source and Trust -- Trust, the Cloud, and the Edge -- Hardware, Trust, and Confidential Computing -- Trust Domains -- A World of Explicit Trust -- References -- Index
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (John Wiley, viewed November 9, 2021).
|
520 |
|
|
|a Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell's experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master's students in software architecture and security.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1119692326
|z 9781119692324
|w (OCoLC)1251766401
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119692324/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17508450
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39382945
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302545395
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3075945
|
994 |
|
|
|a 92
|b IZTAP
|