Cloud security: a comprehensive guide to secure cloud computing
"Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase ca...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, Ind.
Wiley Pub.
2010
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780470589878/?ar |
Zusammenfassung: | "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxvi, 358 Seiten) illustrations |
ISBN: | 9780470921449 0470921447 9786612756399 661275639X 9780470589878 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047486430 | ||
003 | DE-627-1 | ||
005 | 20240228114633.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2010 xx |||||o 00| ||eng c | ||
020 | |a 9780470921449 |c electronic bk. |9 978-0-470-92144-9 | ||
020 | |a 0470921447 |c electronic bk. |9 0-470-92144-7 | ||
020 | |a 9786612756399 |9 9786612756399 | ||
020 | |a 661275639X |9 661275639X | ||
020 | |a 9780470589878 |9 978-0-470-58987-8 | ||
035 | |a (DE-627-1)047486430 | ||
035 | |a (DE-599)KEP047486430 | ||
035 | |a (ORHE)9780470589878 | ||
035 | |a (DE-627-1)047486430 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Krutz, Ronald L. |d 1938- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cloud security |b a comprehensive guide to secure cloud computing |c Ronald L. Krutz, Russell Dean Vines |
264 | 1 | |a Indianapolis, Ind. |b Wiley Pub. |c 2010 | |
300 | |a 1 Online-Ressource (xxvi, 358 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data processing | |
650 | 4 | |a Computer security | |
700 | 1 | |a Vines, Russell Dean |d 1952- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780470589878 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780470589878 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780470589878/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047486430 |
---|---|
_version_ | 1821494896215719936 |
adam_text | |
any_adam_object | |
author | Krutz, Ronald L. 1938- |
author2 | Vines, Russell Dean 1952- |
author2_role | ctb |
author2_variant | r d v rd rdv |
author_facet | Krutz, Ronald L. 1938- Vines, Russell Dean 1952- |
author_role | aut |
author_sort | Krutz, Ronald L. 1938- |
author_variant | r l k rl rlk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047486430 (DE-599)KEP047486430 (ORHE)9780470589878 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02846cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047486430</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114633.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2010 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470921449</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-92144-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470921447</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-92144-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612756399</subfield><subfield code="9">9786612756399</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">661275639X</subfield><subfield code="9">661275639X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470589878</subfield><subfield code="9">978-0-470-58987-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047486430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047486430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780470589878</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047486430</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krutz, Ronald L.</subfield><subfield code="d">1938-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud security</subfield><subfield code="b">a comprehensive guide to secure cloud computing</subfield><subfield code="c">Ronald L. Krutz, Russell Dean Vines</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 358 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vines, Russell Dean</subfield><subfield code="d">1952-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780470589878</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780470589878</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780470589878/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047486430 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:39Z |
institution | BVB |
isbn | 9780470921449 0470921447 9786612756399 661275639X 9780470589878 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 358 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley Pub. |
record_format | marc |
spelling | Krutz, Ronald L. 1938- VerfasserIn aut Cloud security a comprehensive guide to secure cloud computing Ronald L. Krutz, Russell Dean Vines Indianapolis, Ind. Wiley Pub. 2010 1 Online-Ressource (xxvi, 358 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support"--Resource description page. Cloud computing Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Data processing Vines, Russell Dean 1952- MitwirkendeR ctb 9780470589878 Erscheint auch als Druck-Ausgabe 9780470589878 |
spellingShingle | Krutz, Ronald L. 1938- Cloud security a comprehensive guide to secure cloud computing Cloud computing Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Data processing |
title | Cloud security a comprehensive guide to secure cloud computing |
title_auth | Cloud security a comprehensive guide to secure cloud computing |
title_exact_search | Cloud security a comprehensive guide to secure cloud computing |
title_full | Cloud security a comprehensive guide to secure cloud computing Ronald L. Krutz, Russell Dean Vines |
title_fullStr | Cloud security a comprehensive guide to secure cloud computing Ronald L. Krutz, Russell Dean Vines |
title_full_unstemmed | Cloud security a comprehensive guide to secure cloud computing Ronald L. Krutz, Russell Dean Vines |
title_short | Cloud security |
title_sort | cloud security a comprehensive guide to secure cloud computing |
title_sub | a comprehensive guide to secure cloud computing |
topic | Cloud computing Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Data processing |
topic_facet | Cloud computing Security measures Computer security Computer Security Infonuagique ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Data processing |
work_keys_str_mv | AT krutzronaldl cloudsecurityacomprehensiveguidetosecurecloudcomputing AT vinesrusselldean cloudsecurityacomprehensiveguidetosecurecloudcomputing |