It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 05034cam 2200841Ii 4500
001 ocn953695026
003 OCoLC
005 20220901030935.0
008 160718s2016 sz a ob 001 0 eng d
006 m o d
007 cr cnu|unuuu||
040 $aN$T$beng$erda$epn$cN$T$dYDXCP$dGW5XE$dIDEBK$dAZU$dN$T$dCOO$dDEBSZ$dUAB$dOCLCQ$dIAD$dJBG$dICW$dZ5A$dILO$dICN$dOCLCQ$dESU$dIOG$dU3W$dBUF$dJG0$dCEF$dKSU$dOCLCQ$dWYU$dUKMGB$dUKAHL$dOCLCQ$dAJS$dOCLCO
015 $aGBB8K7205$2bnb
016 7 $a019109761$2Uk
020 $a9783319414119$q(electronic bk.)
020 $a3319414119$q(electronic bk.)
020 $a3319414100$q(print)
020 $a9783319414102$q(print)
020 $z9783319414102$q(print)
024 7 $a10.1007/978-3-319-41411-9$2doi
035 $a(OCoLC)953695026
037 $acom.springer.onix.9783319414119$bSpringer Nature
050 4 $aQA76.585
072 7 $aCOM$x091000$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$223
100 1 $aAlani, Mohammed M.,$eauthor.
245 10 $aElements of cloud computing security :$ba survey of key practicalities /$cMohammed M. Alani.
264 1 $aSwitzerland :$bSpringer,$c2016.
300 $a1 online resource (xi, 55 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aSpringerBriefs in computer science
504 $aIncludes bibliographical references and index.
588 0 $aOnline resource; title from PDF title page (SpringerLink, viewed July 21, 2016).
505 0 $aWhat is the Cloud? -- About Cloud Security -- Security Threats in Cloud Computing -- Security Attacks in Cloud Computing -- General Cloud Security Recommendations.
520 $aThis book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
650 0 $aCloud computing$xSecurity measures.
650 6 $aInfonuagique$xSécurité$xMesures.
650 7 $aComputer security.$2bicssc
650 7 $aData encryption.$2bicssc
650 7 $aData mining.$2bicssc
650 7 $aNetwork hardware.$2bicssc
650 7 $aCOMPUTERS$xCloud Computing.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrinted edition:$z9783319414102
830 0 $aSpringerBriefs in computer science.
856 40 $3EBSCOhost$uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1250624
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=940493
856 40 $3OhioLINK$uhttp://rave.ohiolink.edu/ebooks/ebc/9783319414119
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4592504
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2017-08-17/9/9783319414119
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-319-41411-9
856 40 $3SpringerLink$uhttp://link.springer.com/10.1007/978-3-319-41411-9
856 40 $3SpringerLink$uhttp://sfx.carli.illinois.edu/sfxwhe/sfx_local?genre=book&sid=Voyager:WHE&sfx.ignore_date_threshold=1&svc.fulltext=yes&rft.isbn=978-3-319-41411-9$zAvailable to Wheaton College users only
856 40 $3SpringerLink$uhttp://link.springer.com/openurl?genre=book&isbn=978-3-319-41410-2
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-319-41411-9
856 40 $3VLeBooks$uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319414119
856 40 $uhttps://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-41411-9$zConnect to Springer e-book
856 40 $uhttps://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-319-41411-9$zConnect to Springer e-book
938 $aAskews and Holts Library Services$bASKH$nAH32218379
938 $aEBSCOhost$bEBSC$n1250624
938 $aProQuest MyiLibrary Digital eBook Collection$bIDEB$ncis35311150
938 $aYBP Library Services$bYANK$n13077242
029 1 $aAU@$b000058477508
029 1 $aAU@$b000062420646
029 1 $aDEBSZ$b480364494
029 1 $aUKMGB$b019109761
994 $aZ0$bIME
948 $hNO HOLDINGS IN IME - 241 OTHER HOLDINGS