|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1288628448 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
171121s2020 xx o 000 0 eng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d ORMDA
|d OCLCO
|d OCLCF
|d OCLCQ
|
020 |
|
|
|a 9780429619649
|q (electronic bk.)
|
020 |
|
|
|a 0429619642
|q (electronic bk.)
|
020 |
|
|
|z 036756033X
|
020 |
|
|
|z 0429055129
|
020 |
|
|
|z 0367151162
|
020 |
|
|
|z 9780367151164
|
020 |
|
|
|z 9780367560331
|
020 |
|
|
|z 9780429055126
|
024 |
8 |
|
|a KE73628
|
024 |
8 |
|
|a 9780429619649
|
029 |
0 |
|
|a AU@
|b 000070307962
|
035 |
|
|
|a (OCoLC)1288628448
|
037 |
|
|
|a 9780429619649
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.585
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vacca, John,
|e author.
|
245 |
1 |
0 |
|a Cloud Computing Security, 2nd Edition
|h [electronic resource] /
|c Vacca, John.
|
250 |
|
|
|a 2nd edition.
|
264 |
|
1 |
|b CRC Press,
|c 2020.
|
300 |
|
|
|a 1 online resource (522 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
|
542 |
|
|
|f Copyright © CRC Press 2020
|g 2020
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title page (viewed November 9, 2020)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780429619649/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|