Cargando…

Cloud storage security : a practical guide /

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wheeler, Aaron (Autor), Winburn, Michael (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands : Elsevier, [2015]
Colección:Computer science reviews and trends.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 SCIDIR_ocn913513664
003 OCoLC
005 20231120112007.0
006 m o d
007 cr cnu|||unuuu
008 150709s2015 si ob 000 0 eng d
010 |a  2017287331 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OPELS  |d EBLCP  |d DEBSZ  |d TEFOD  |d CDX  |d YDXCP  |d IDEBK  |d TEFOD  |d B24X7  |d COO  |d D6H  |d Z5A  |d VT2  |d VGM  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d RRP  |d BUF  |d WRM  |d U3W  |d OCLCF  |d OCLCQ  |d WYU  |d UKMGB  |d OCLCQ  |d MM9  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO 
015 |a GBB559610  |2 bnb 
016 7 |a 017185184  |2 Uk 
019 |a 914151841  |a 988636253  |a 1008956880  |a 1066446158  |a 1103278119  |a 1129359416  |a 1153036195  |a 1192330440  |a 1235837882  |a 1240506396  |a 1262671715  |a 1391291818 
020 |a 9780128029312  |q (electronic bk.) 
020 |a 0128029315  |q (electronic bk.) 
020 |a 0128029307 
020 |a 9780128029305 
020 |z 9780128029305 
035 |a (OCoLC)913513664  |z (OCoLC)914151841  |z (OCoLC)988636253  |z (OCoLC)1008956880  |z (OCoLC)1066446158  |z (OCoLC)1103278119  |z (OCoLC)1129359416  |z (OCoLC)1153036195  |z (OCoLC)1192330440  |z (OCoLC)1235837882  |z (OCoLC)1240506396  |z (OCoLC)1262671715  |z (OCoLC)1391291818 
050 4 |a QA76.585 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6782  |2 23 
100 1 |a Wheeler, Aaron,  |e author. 
245 1 0 |a Cloud storage security :  |b a practical guide /  |c Aaron Wheeler, Michael Winburn. 
264 1 |a Amsterdam, Netherlands :  |b Elsevier,  |c [2015] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer Science Reviews and Trends 
504 |a Includes bibliographical references. 
588 0 |a Vendor-supplied metadata. 
520 |a Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information. 
505 0 |a Front Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email. 
505 8 |a 2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service. 
505 8 |a 2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media. 
505 8 |a 2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy. 
505 8 |a 2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends. 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Data protection. 
650 6 |a Infonuagique  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)000300427 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Winburn, Michael,  |e author. 
776 0 8 |i Print version:  |a Wheeler, Aaron.  |t Cloud Storage Security : A Practical Guide.  |d Burlington : Elsevier Science, �2015  |z 9780128029305 
830 0 |a Computer science reviews and trends. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128029305  |z Texto completo