doorgaan naar inhoud
Cloud security and privacy Voorbeeldweergave van dit item
SluitenVoorbeeldweergave van dit item
Bezig met controle...

Cloud security and privacy

Auteur: Tim Mather; Subra Kumaraswamy; Shahed Latif
Uitgever: Beijing ; Cambridge [Mass.] : O'Reilly, ©2009.
Serie: Theory in practice (Sebastopol, Calif.)
Editie/Formaat:   Gedrukt boek : Engels : 1st edAlle edities en materiaalsoorten bekijken.
Samenvatting:
You may regard cloud computing as an ideal way for your company to control It costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for It staffers, information security and privacy  Meer lezen...
Beoordeling:

(nog niet beoordeeld) 0 met beoordelingen - U bent de eerste

Onderwerpen
Meer in deze trant

 

Zoeken naar een in de bibliotheek beschikbaar exemplaar

&AllPage.SpinnerRetrieving; Bibliotheken met dit item worden gezocht…

Details

Soort document Boek
Alle auteurs / medewerkers: Tim Mather; Subra Kumaraswamy; Shahed Latif
ISBN: 9780596802769 0596802765
OCLC-nummer: 419866951
Beschrijving: xvii, 312 pages : illustrations ; 24 cm.
Inhoud: Introduction --
What is cloud computing? --
Infrastructure security --
Data security and storage --
Identity and access management --
Security management in the cloud --
Privacy --
Audit and compliance --
Examples of cloud service providers --
Security-as-a-[cloud] service --
The impact of cloud computing on the role of corporate IT --
Conclusion, and the future of the cloud.
Serietitel: Theory in practice (Sebastopol, Calif.)
Verantwoordelijkheid: Tim Mather, Subra Kumaraswamy, and Shahed Latif.

Fragment:

Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. This book Addresses issues that affect any organization preparing to  Meer lezen...

Beoordelingen

Beoordelingen door gebruikers
Beoordelingen van GoodReads worden opgehaald...
Bezig met opvragen DOGObooks-reviews...

Tags

U bent de eerste.
Bevestig deze aanvraag

Misschien heeft u dit item reeds aangevraagd. Selecteer a.u.b. Ok als u toch wilt doorgaan met deze aanvraag.

Gekoppelde data


Primary Entity

<http://www.worldcat.org/oclc/419866951> # Cloud security and privacy
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "419866951" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/306961214#Place/cambridge_mass> ; # Cambridge Mass.
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/306961214#Place/beijing> ; # Beijing
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cc> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/sicherheitsmassnahme> ; # Sicherheitsmassnahme
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/reseaux_informatiques> ; # Réseaux informatiques
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/cloud_computing_security_measures> ; # Cloud computing--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/computersicherheit> ; # Computersicherheit
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/delits_informatiques> ; # Délits informatiques
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/cloud_computing> ; # Cloud Computing
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/technologies_de_l_information_et_de_la_communication> ; # Technologies de l'information et de la communication
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/306961214#Topic/informatique_en_nuage> ; # Informatique en nuage
   schema:bookEdition "1st ed." ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/306961214#Person/latif_shahed> ; # Shahed Latif
   schema:contributor <http://experiment.worldcat.org/entity/work/data/306961214#Person/kumaraswamy_subra> ; # Subra Kumaraswamy
   schema:copyrightYear "2009" ;
   schema:creator <http://viaf.org/viaf/44025777> ; # Tim Mather
   schema:datePublished "2009" ;
   schema:description "Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud."@en ;
   schema:description "You may regard cloud computing as an ideal way for your company to control It costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for It staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (Iam) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/306961214> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/306961214#Series/theory_in_practice_sebastopol_calif> ; # Theory in practice (Sebastopol, Calif.)
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/306961214#Series/theory_in_practice> ; # Theory in practice
   schema:name "Cloud security and privacy"@en ;
   schema:productID "419866951" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/419866951#PublicationEvent/beijing_cambridge_mass_o_reilly_2009> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/306961214#Agent/o_reilly> ; # O'Reilly
   schema:workExample <http://worldcat.org/isbn/9780596802769> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA976752> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/419866951> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/306961214#Person/kumaraswamy_subra> # Subra Kumaraswamy
    a schema:Person ;
   schema:familyName "Kumaraswamy" ;
   schema:givenName "Subra" ;
   schema:name "Subra Kumaraswamy" ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Person/latif_shahed> # Shahed Latif
    a schema:Person ;
   schema:familyName "Latif" ;
   schema:givenName "Shahed" ;
   schema:name "Shahed Latif" ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Series/theory_in_practice> # Theory in practice
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/419866951> ; # Cloud security and privacy
   schema:name "Theory in practice" ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Series/theory_in_practice_sebastopol_calif> # Theory in practice (Sebastopol, Calif.)
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/419866951> ; # Cloud security and privacy
   schema:name "Theory in practice (Sebastopol, Calif.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/delits_informatiques> # Délits informatiques
    a schema:Intangible ;
   schema:name "Délits informatiques"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/informatique_en_nuage> # Informatique en nuage
    a schema:Intangible ;
   schema:name "Informatique en nuage"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/reseaux_informatiques> # Réseaux informatiques
    a schema:Intangible ;
   schema:name "Réseaux informatiques"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/sicherheitsmassnahme> # Sicherheitsmassnahme
    a schema:Intangible ;
   schema:name "Sicherheitsmassnahme"@en ;
   schema:name "Sicherheitsmaßnahme"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/306961214#Topic/technologies_de_l_information_et_de_la_communication> # Technologies de l'information et de la communication
    a schema:Intangible ;
   schema:name "Technologies de l'information et de la communication"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/44025777> # Tim Mather
    a schema:Person ;
   schema:familyName "Mather" ;
   schema:givenName "Tim" ;
   schema:name "Tim Mather" ;
    .

<http://worldcat.org/isbn/9780596802769>
    a schema:ProductModel ;
   schema:isbn "0596802765" ;
   schema:isbn "9780596802769" ;
    .


Content-negotiable representations

Venster sluiten

Meld u aan bij WorldCat 

Heeft u geen account? U kunt eenvoudig een nieuwe gratis account aanmaken.