Securing the cloud : cloud computer security techniques and tactics / / Vic (J.R.) Winkler ; technical editor, Bill Meine.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2011 |
Language: | English |
Series: | Syngress
|
Online Access: | |
Physical Description: | xxiv, 290 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500686827 |
---|---|
ctrlnum |
(MiAaPQ)500686827 (Au-PeEL)EBL686827 (CaPaEBR)ebr10467735 (CaONFJC)MIL309231 (OCoLC)721194746 |
collection |
bib_alma |
record_format |
marc |
spelling |
Winkler, J. R. (Joachim R.) Securing the cloud [electronic resource] : cloud computer security techniques and tactics / Vic (J.R.) Winkler ; technical editor, Bill Meine. Amsterdam : Elsevier, 2011. xxiv, 290 p. : ill. Syngress Includes bibliographical references and index. Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Cloud computing. Computer security. Computer networks Security measures. Electronic books. Meine, Bill. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=686827 Click to View |
language |
English |
format |
Electronic eBook |
author |
Winkler, J. R. |
spellingShingle |
Winkler, J. R. Securing the cloud cloud computer security techniques and tactics / Syngress Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. |
author_facet |
Winkler, J. R. Meine, Bill. ProQuest (Firm) ProQuest (Firm) |
author_variant |
j r w jr jrw |
author_fuller |
(Joachim R.) |
author2 |
Meine, Bill. ProQuest (Firm) |
author2_variant |
b m bm |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Winkler, J. R. |
title |
Securing the cloud cloud computer security techniques and tactics / |
title_sub |
cloud computer security techniques and tactics / |
title_full |
Securing the cloud [electronic resource] : cloud computer security techniques and tactics / Vic (J.R.) Winkler ; technical editor, Bill Meine. |
title_fullStr |
Securing the cloud [electronic resource] : cloud computer security techniques and tactics / Vic (J.R.) Winkler ; technical editor, Bill Meine. |
title_full_unstemmed |
Securing the cloud [electronic resource] : cloud computer security techniques and tactics / Vic (J.R.) Winkler ; technical editor, Bill Meine. |
title_auth |
Securing the cloud cloud computer security techniques and tactics / |
title_new |
Securing the cloud |
title_sort |
securing the cloud cloud computer security techniques and tactics / |
series |
Syngress |
series2 |
Syngress |
publisher |
Elsevier, |
publishDate |
2011 |
physical |
xxiv, 290 p. : ill. |
contents |
Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. |
isbn |
9781597495936 (electronic bk.) |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.585 W56 42011 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=686827 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
721194746 |
work_keys_str_mv |
AT winklerjr securingthecloudcloudcomputersecuritytechniquesandtactics AT meinebill securingthecloudcloudcomputersecuritytechniquesandtactics AT proquestfirm securingthecloudcloudcomputersecuritytechniquesandtactics |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500686827 (Au-PeEL)EBL686827 (CaPaEBR)ebr10467735 (CaONFJC)MIL309231 (OCoLC)721194746 |
is_hierarchy_title |
Securing the cloud cloud computer security techniques and tactics / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330712819433472 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01935nam a2200409 a 4500</leader><controlfield tag="001">500686827</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">110428s2011 ne ad sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011012004</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597495929 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495936 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500686827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL686827</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10467735</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL309231</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)721194746</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.W56 2011</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, J. R.</subfield><subfield code="q">(Joachim R.)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the cloud</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">cloud computer security techniques and tactics /</subfield><subfield code="c">Vic (J.R.) Winkler ; technical editor, Bill Meine.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">Elsevier,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 290 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meine, Bill.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=686827</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |