000 01936cam a2200445 a 4500
001 16385025
003 BD-ChPU
005 20250218113627.0
008 100810s2009 cc a b 001 0 eng d
010 _a 2010281455
015 _aGBA976752
_2bnb
016 7 _a015341699
_2Uk
020 _a9780596802769 (pbk.)
020 _a0596802765 (pbk.)
035 _a(OCoLC)ocn419866951
040 _aUKM
_cUKM
_dBTCTA
_dBWX
_dC#P
_dVVC
_dCHVBK
_dDLC
_dBD-ChPU
_beng
042 _alccopycat
050 0 0 _aTK5105.59
_b.M38 2009
082 0 4 _a005.8 M427c 2009
_222
100 1 _aMather, Tim.
_eauthor.
245 1 0 _aCloud security and privacy /
_cTim Mather, Subra Kumaraswamy and Shahed Latif.
250 _aFirst edition.
260 _aBeijing ;
_aCambridge [Mass.] :
_bO'Reilly,
_cc2009.
300 _axvii, 312 pages :
_billustrations ;
_c24 cm.
490 1 _aTheory in practice
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
526 _aComputer Science & Engineering
650 0 _aComputer networks
_xSecurity measures.
_94777
650 0 _aCloud computing
_xSecurity measures.
650 7 _aCloud Computing.
_2swd
650 7 _aSicherheitsmassnahme.
_2swd
650 7 _aComputersicherheit.
_2swd
700 1 _aKumaraswamy, Subra,
_eauthor.
700 1 _aLatif, Shahed,
_eauthor.
830 0 _aTheory in practice (Sebastopol, Calif.)
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c7833
_d7833