Cargando…

Cloud Computing Security, 2nd Edition

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper secur...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vacca, John (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: CRC Press, 2020.
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1288628448
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 171121s2020 xx o 000 0 eng d
040 |a AU@  |b eng  |c AU@  |d ORMDA  |d OCLCO  |d OCLCF  |d OCLCQ 
020 |a 9780429619649  |q (electronic bk.) 
020 |a 0429619642  |q (electronic bk.) 
020 |z 036756033X 
020 |z 0429055129 
020 |z 0367151162 
020 |z 9780367151164 
020 |z 9780367560331 
020 |z 9780429055126 
024 8 |a KE73628 
024 8 |a 9780429619649 
029 0 |a AU@  |b 000070307962 
035 |a (OCoLC)1288628448 
037 |a 9780429619649  |b O'Reilly Media 
050 4 |a QA76.585 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Vacca, John,  |e author. 
245 1 0 |a Cloud Computing Security, 2nd Edition  |h [electronic resource] /  |c Vacca, John. 
250 |a 2nd edition. 
264 1 |b CRC Press,  |c 2020. 
300 |a 1 online resource (522 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. 
542 |f Copyright © CRC Press 2020  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed November 9, 2020) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780429619649/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP