000 01833cam a2200433 a 4500
001 16385025
005 20210309160519.0
008 100810s2009 cc a b 001 0 eng d
010 _a2010281455
015 _aGBA976752
_2bnb
016 7 _a015341699
_2Uk
020 _a9788184048155
020 _a9780596802769 (pbk.)
020 _a0596802765 (pbk.)
035 _a(OCoLC)ocn419866951
040 _aUKM
_cUKM
_dBTCTA
_dBWX
_dC#P
_dVVC
_dCHVBK
_dDLC
042 _alccopycat
050 0 0 _aTK5105.59
_b.M38 2009
082 0 4 _a005.8 MAT-T
_222
100 1 _aMather, Tim.
245 1 0 _aCloud security and privacy /
_cTim Mather, Subra Kumaraswamy, and Shahed Latif.
250 _a1st ed.
260 _aBeijing ;
_aCambridge [Mass.] :
_bO'Reilly,
_cc2009.
300 _axvii, 312 p. :
_bill. ;
_c24 cm.
365 _aINR
_b525.00
490 1 _aTheory in practice
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCloud computing
_xSecurity measures.
650 7 _aCloud Computing.
_2swd
650 7 _aSicherheitsmassnahme.
_2swd
650 7 _aComputersicherheit.
_2swd
700 1 _aKumaraswamy, Subra.
700 1 _aLatif, Shahed.
830 0 _aTheory in practice (Sebastopol, Calif.)
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
955 _bxe05 2010-08-10 z-processor to USPL
_axh00 2010-08-11 to USPL/STM
_ixh84 2011-02-17 to BCCD
999 _c24584
_d24584