Cloud security and privacy / Tim Mather, Subra Kumaraswamy and Shahed Latif.
Material type:
- 9780596802769 (pbk.)
- 0596802765 (pbk.)
- 005.8 M427c 2009 22
- TK5105.59 .M38 2009
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Premier University Faculty of Engineering Library | 005.8 M427c 2009 | 1 | Available | 28758 | ||
![]() |
Premier University Faculty of Engineering Library | 005.8 M427c 2009 | 2 | Available | 28759 | ||
![]() |
Premier University Faculty of Engineering Library | 005.8 M427c 2009 | 3 | Available | 28760 | ||
![]() |
Premier University Faculty of Engineering Library | 005.8 M427c 2009 | 4 | Available | 28761 | ||
![]() |
Premier University Faculty of Engineering Library | 005.8 M427c 2009 | 5 | Available | 28762 |
Includes bibliographical references and index.
Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
Computer Science & Engineering
There are no comments on this title.