Guide to security assurance for cloud computing:
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cham ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2015]
|
Schriftenreihe: | Computer Communications and Networks
|
Schlagwörter: | |
Umfang: | xviii, 229 Seiten Illustrationen, Diagramme |
ISBN: | 9783319259864 |
ISSN: | 1617-7975 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043507332 | ||
003 | DE-604 | ||
005 | 20160421 | ||
007 | t| | ||
008 | 160412s2015 xx a||| |||| 00||| eng d | ||
020 | |a 9783319259864 |c hbk |9 978-3-319-25986-4 | ||
035 | |a (OCoLC)951022301 | ||
035 | |a (DE-599)BVBBV043507332 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Guide to security assurance for cloud computing |c Shao Ying Zhu, Richard Hill, Marcello Trovati, editors |
264 | 1 | |a Cham ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a xviii, 229 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Computer Communications and Networks |x 1617-7975 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Zhu, Shao Ying |0 (DE-588)1084140373 |4 edt | |
700 | 1 | |a Hill, Richard |d 1972- |e Sonstige |0 (DE-588)1030173702 |4 oth | |
700 | 1 | |a Trovati, Marcello |e Sonstige |0 (DE-588)1084139987 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-25988-8 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028923611 |
Datensatz im Suchindex
_version_ | 1818981869680590848 |
---|---|
any_adam_object | |
author2 | Zhu, Shao Ying |
author2_role | edt |
author2_variant | s y z sy syz |
author_GND | (DE-588)1084140373 (DE-588)1030173702 (DE-588)1084139987 |
author_facet | Zhu, Shao Ying |
building | Verbundindex |
bvnumber | BV043507332 |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)951022301 (DE-599)BVBBV043507332 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02176nam a2200577 c 4500</leader><controlfield tag="001">BV043507332</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160421 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">160412s2015 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319259864</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-319-25986-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)951022301</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043507332</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guide to security assurance for cloud computing</subfield><subfield code="c">Shao Ying Zhu, Richard Hill, Marcello Trovati, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 229 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer Communications and Networks</subfield><subfield code="x">1617-7975</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Shao Ying</subfield><subfield code="0">(DE-588)1084140373</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hill, Richard</subfield><subfield code="d">1972-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1030173702</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trovati, Marcello</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1084139987</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-25988-8</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028923611</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043507332 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:38:11Z |
institution | BVB |
isbn | 9783319259864 |
issn | 1617-7975 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028923611 |
oclc_num | 951022301 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xviii, 229 Seiten Illustrationen, Diagramme |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | Computer Communications and Networks |
spelling | Guide to security assurance for cloud computing Shao Ying Zhu, Richard Hill, Marcello Trovati, editors Cham ; Heidelberg ; New York ; Dordrecht ; London Springer [2015] © 2015 xviii, 229 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Computer Communications and Networks 1617-7975 Computer science Computer communication systems Computer security Management information systems Computer Science Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Informatik Informationssystem (DE-588)4072806-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s Informationssystem (DE-588)4072806-7 s DE-604 Zhu, Shao Ying (DE-588)1084140373 edt Hill, Richard 1972- Sonstige (DE-588)1030173702 oth Trovati, Marcello Sonstige (DE-588)1084139987 oth Erscheint auch als Online-Ausgabe 978-3-319-25988-8 |
spellingShingle | Guide to security assurance for cloud computing Computer science Computer communication systems Computer security Management information systems Computer Science Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Informatik Informationssystem (DE-588)4072806-7 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4072806-7 (DE-588)4011134-9 (DE-588)4026894-9 (DE-588)4011144-1 (DE-588)4143413-4 |
title | Guide to security assurance for cloud computing |
title_auth | Guide to security assurance for cloud computing |
title_exact_search | Guide to security assurance for cloud computing |
title_full | Guide to security assurance for cloud computing Shao Ying Zhu, Richard Hill, Marcello Trovati, editors |
title_fullStr | Guide to security assurance for cloud computing Shao Ying Zhu, Richard Hill, Marcello Trovati, editors |
title_full_unstemmed | Guide to security assurance for cloud computing Shao Ying Zhu, Richard Hill, Marcello Trovati, editors |
title_short | Guide to security assurance for cloud computing |
title_sort | guide to security assurance for cloud computing |
topic | Computer science Computer communication systems Computer security Management information systems Computer Science Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Informatik Informationssystem (DE-588)4072806-7 gnd Datenschutz (DE-588)4011134-9 gnd Informatik (DE-588)4026894-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer science Computer communication systems Computer security Management information systems Computer Science Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Informatik Informationssystem Datenschutz Datensicherung Aufsatzsammlung |
work_keys_str_mv | AT zhushaoying guidetosecurityassuranceforcloudcomputing AT hillrichard guidetosecurityassuranceforcloudcomputing AT trovatimarcello guidetosecurityassuranceforcloudcomputing |