|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn913513664 |
003 |
OCoLC |
005 |
20231120112007.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150709s2015 si ob 000 0 eng d |
010 |
|
|
|a 2017287331
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OPELS
|d EBLCP
|d DEBSZ
|d TEFOD
|d CDX
|d YDXCP
|d IDEBK
|d TEFOD
|d B24X7
|d COO
|d D6H
|d Z5A
|d VT2
|d VGM
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d RRP
|d BUF
|d WRM
|d U3W
|d OCLCF
|d OCLCQ
|d WYU
|d UKMGB
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|
015 |
|
|
|a GBB559610
|2 bnb
|
016 |
7 |
|
|a 017185184
|2 Uk
|
019 |
|
|
|a 914151841
|a 988636253
|a 1008956880
|a 1066446158
|a 1103278119
|a 1129359416
|a 1153036195
|a 1192330440
|a 1235837882
|a 1240506396
|a 1262671715
|a 1391291818
|
020 |
|
|
|a 9780128029312
|q (electronic bk.)
|
020 |
|
|
|a 0128029315
|q (electronic bk.)
|
020 |
|
|
|a 0128029307
|
020 |
|
|
|a 9780128029305
|
020 |
|
|
|z 9780128029305
|
035 |
|
|
|a (OCoLC)913513664
|z (OCoLC)914151841
|z (OCoLC)988636253
|z (OCoLC)1008956880
|z (OCoLC)1066446158
|z (OCoLC)1103278119
|z (OCoLC)1129359416
|z (OCoLC)1153036195
|z (OCoLC)1192330440
|z (OCoLC)1235837882
|z (OCoLC)1240506396
|z (OCoLC)1262671715
|z (OCoLC)1391291818
|
050 |
|
4 |
|a QA76.585
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6782
|2 23
|
100 |
1 |
|
|a Wheeler, Aaron,
|e author.
|
245 |
1 |
0 |
|a Cloud storage security :
|b a practical guide /
|c Aaron Wheeler, Michael Winburn.
|
264 |
|
1 |
|a Amsterdam, Netherlands :
|b Elsevier,
|c [2015]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Computer Science Reviews and Trends
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
520 |
|
|
|a Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
|
505 |
0 |
|
|a Front Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email.
|
505 |
8 |
|
|a 2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service.
|
505 |
8 |
|
|a 2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media.
|
505 |
8 |
|
|a 2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy.
|
505 |
8 |
|
|a 2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Infonuagique
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)000300427
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|0 (CaQQLa)201-0061151
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Data protection
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Winburn, Michael,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Wheeler, Aaron.
|t Cloud Storage Security : A Practical Guide.
|d Burlington : Elsevier Science, �2015
|z 9780128029305
|
830 |
|
0 |
|a Computer science reviews and trends.
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128029305
|z Texto completo
|