It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 04081cam 2200661 a 4500
001 ocn419866951
003 OCoLC
005 20201024054434.0
008 100810s2009 cc a b 001 0 eng
010 $a 2010281455
040 $aUKM$beng$cDLC$dUKM$dBTCTA$dBWX$dC#P$dVVC$dCHVBK$dYDXCP$dBDX$dBEDGE$dOCLCQ$dA7U$dOCLCQ$dTHHCU$dVGM$dYDX$dTHHCU$dCSJ$dOCLCQ$dOCLCF$dOCLCO$dOCLCA$dAU@$dOCLCQ$dOCLCA
015 $aGBA976752$2bnb
016 7 $a015341699$2Uk
020 $a9780596802769$q(pbk.)
020 $a0596802765$q(pbk.)
035 $a(OCoLC)419866951
042 $alccopycat
050 00 $aTK5105.59$b.M38 2009
082 04 $a005.8$222
100 1 $aMather, Tim.
245 10 $aCloud security and privacy /$cTim Mather, Subra Kumaraswamy, and Shahed Latif.
250 $a1st ed.
260 $aBeijing ;$aCambridge [Mass.] :$bO'Reilly,$c©2009.
300 $axvii, 312 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aTheory in practice
504 $aIncludes bibliographical references and index.
505 0 $aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
520 $aYou may regard cloud computing as an ideal way for your company to control It costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for It staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (Iam) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aCloud computing$xSecurity measures.
650 7 $aRéseaux informatiques.$2eclas
650 7 $aInformatique en nuage.$2eclas
650 7 $aTechnologies de l'information et de la communication.$2eclas
650 7 $aSécurité informatique.$2eclas
650 7 $aDélits informatiques.$2eclas
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aCloud Computing$2gnd
650 7 $aSicherheitsmaßnahme$2gnd
650 7 $aComputersicherheit$2gnd
650 7 $aSicherheitsmassnahme.$2swd
700 1 $aKumaraswamy, Subra.
700 1 $aLatif, Shahed.
830 0 $aTheory in practice (Sebastopol, Calif.)
938 $aBrodart$bBROD$n10577017$c$34.99
938 $aBaker and Taylor$bBTCP$nBK0008457809
938 $aYBP Library Services$bYANK$n3110274
029 1 $aAU@$b000044884665
029 1 $aAU@$b000045795686
029 1 $aAU@$b000057347719
029 1 $aCHNEW$b000499263
029 1 $aCHVBK$b035679964
029 1 $aNZ1$b13320564
029 1 $aUNITY$b120325918
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 226 OTHER HOLDINGS