000 | 01833cam a2200433 a 4500 | ||
---|---|---|---|
001 | 16385025 | ||
005 | 20210309160519.0 | ||
008 | 100810s2009 cc a b 001 0 eng d | ||
010 | _a2010281455 | ||
015 |
_aGBA976752 _2bnb |
||
016 | 7 |
_a015341699 _2Uk |
|
020 | _a9788184048155 | ||
020 | _a9780596802769 (pbk.) | ||
020 | _a0596802765 (pbk.) | ||
035 | _a(OCoLC)ocn419866951 | ||
040 |
_aUKM _cUKM _dBTCTA _dBWX _dC#P _dVVC _dCHVBK _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aTK5105.59 _b.M38 2009 |
082 | 0 | 4 |
_a005.8 MAT-T _222 |
100 | 1 | _aMather, Tim. | |
245 | 1 | 0 |
_aCloud security and privacy / _cTim Mather, Subra Kumaraswamy, and Shahed Latif. |
250 | _a1st ed. | ||
260 |
_aBeijing ; _aCambridge [Mass.] : _bO'Reilly, _cc2009. |
||
300 |
_axvii, 312 p. : _bill. ; _c24 cm. |
||
365 |
_aINR _b525.00 |
||
490 | 1 | _aTheory in practice | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aCloud computing _xSecurity measures. |
|
650 | 7 |
_aCloud Computing. _2swd |
|
650 | 7 |
_aSicherheitsmassnahme. _2swd |
|
650 | 7 |
_aComputersicherheit. _2swd |
|
700 | 1 | _aKumaraswamy, Subra. | |
700 | 1 | _aLatif, Shahed. | |
830 | 0 | _aTheory in practice (Sebastopol, Calif.) | |
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
955 |
_bxe05 2010-08-10 z-processor to USPL _axh00 2010-08-11 to USPL/STM _ixh84 2011-02-17 to BCCD |
||
999 |
_c24584 _d24584 |