Building the infrastructure for cloud security: a solutions view
The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure. This book provides a com...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley, CA
Apress
2014
|
Schriftenreihe: | The expert's voice in Internet security
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781430261452/?ar |
Zusammenfassung: | The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure. This book provides a comprehensive look at the various facets of Cloud Security; infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a Security perspective. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from PDF title page (SpringerLink, viewed March 31, 2014) |
Umfang: | 1 Online-Ressource (xxvi, 212 Seiten) illustrations |
ISBN: | 9781430261469 1430261463 1430261455 9781430261452 |
Zugangsbedingungen: | Open Access. |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047575867 | ||
003 | DE-627-1 | ||
005 | 20240228115532.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781430261469 |c electronic bk. |9 978-1-4302-6146-9 | ||
020 | |a 1430261463 |c electronic bk. |9 1-4302-6146-3 | ||
020 | |a 1430261455 |9 1-4302-6145-5 | ||
020 | |a 9781430261452 |9 978-1-4302-6145-2 | ||
020 | |a 9781430261452 |9 978-1-4302-6145-2 | ||
035 | |a (DE-627-1)047575867 | ||
035 | |a (DE-599)KEP047575867 | ||
035 | |a (ORHE)9781430261452 | ||
035 | |a (DE-627-1)047575867 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 004.67/82 |2 23 | |
100 | 1 | |a Yeluri, Raghu |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Building the infrastructure for cloud security |b a solutions view |c Raghu Yeluri, Enrique Castro-Leon |
264 | 1 | |a Berkeley, CA |b Apress |c 2014 | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource (xxvi, 212 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The expert's voice in Internet security | |
500 | |a Includes bibliographical references and index. - Online resource; title from PDF title page (SpringerLink, viewed March 31, 2014) | ||
506 | |a Open Access. | ||
520 | |a The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure. This book provides a comprehensive look at the various facets of Cloud Security; infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a Security perspective. | ||
546 | |a English. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a computerwetenschappen | |
650 | 0 | |a computer sciences | |
650 | 0 | |a gegevensbeheer | |
650 | 0 | |a data management | |
650 | 0 | |a Information and Communication Technology (General) | |
650 | 0 | |a Informatie- en communicatietechnologie (algemeen) | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Castro-Leon, Enrique |e VerfasserIn |4 aut | |
776 | 1 | |z 9781430261469 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781430261469 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781430261452/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047575867 |
---|---|
_version_ | 1821494878933090304 |
adam_text | |
any_adam_object | |
author | Yeluri, Raghu Castro-Leon, Enrique |
author_facet | Yeluri, Raghu Castro-Leon, Enrique |
author_role | aut aut |
author_sort | Yeluri, Raghu |
author_variant | r y ry e c l ecl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047575867 (DE-599)KEP047575867 (ORHE)9781430261452 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02960cam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-047575867</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115532.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261469</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4302-6146-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430261463</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4302-6146-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1430261455</subfield><subfield code="9">1-4302-6145-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261452</subfield><subfield code="9">978-1-4302-6145-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781430261452</subfield><subfield code="9">978-1-4302-6145-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047575867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047575867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781430261452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047575867</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yeluri, Raghu</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building the infrastructure for cloud security</subfield><subfield code="b">a solutions view</subfield><subfield code="c">Raghu Yeluri, Enrique Castro-Leon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 212 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The expert's voice in Internet security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from PDF title page (SpringerLink, viewed March 31, 2014)</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open Access.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure. This book provides a comprehensive look at the various facets of Cloud Security; infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a Security perspective.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">computerwetenschappen</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">computer sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">gegevensbeheer</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">data management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information and Communication Technology (General)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Informatie- en communicatietechnologie (algemeen)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Castro-Leon, Enrique</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781430261469</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781430261469</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781430261452/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047575867 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:23Z |
institution | BVB |
isbn | 9781430261469 1430261463 1430261455 9781430261452 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 212 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Apress |
record_format | marc |
series2 | The expert's voice in Internet security |
spelling | Yeluri, Raghu VerfasserIn aut Building the infrastructure for cloud security a solutions view Raghu Yeluri, Enrique Castro-Leon Berkeley, CA Apress 2014 ©2014 1 Online-Ressource (xxvi, 212 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The expert's voice in Internet security Includes bibliographical references and index. - Online resource; title from PDF title page (SpringerLink, viewed March 31, 2014) Open Access. The goal of the book is to gather together all the relevant security technologies for servers and clients and show through case studies (from the Intel Cloud Builder efforts) how the technologies can work together to provide a strong end-to-end Cloud Security Infrastructure. This book provides a comprehensive look at the various facets of Cloud Security; infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a Security perspective. English. Cloud computing Security measures Data encryption (Computer science) computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Infonuagique ; Sécurité ; Mesures Chiffrement (Informatique) Computer science Castro-Leon, Enrique VerfasserIn aut 9781430261469 Erscheint auch als Druck-Ausgabe 9781430261469 |
spellingShingle | Yeluri, Raghu Castro-Leon, Enrique Building the infrastructure for cloud security a solutions view Cloud computing Security measures Data encryption (Computer science) computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Infonuagique ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
title | Building the infrastructure for cloud security a solutions view |
title_auth | Building the infrastructure for cloud security a solutions view |
title_exact_search | Building the infrastructure for cloud security a solutions view |
title_full | Building the infrastructure for cloud security a solutions view Raghu Yeluri, Enrique Castro-Leon |
title_fullStr | Building the infrastructure for cloud security a solutions view Raghu Yeluri, Enrique Castro-Leon |
title_full_unstemmed | Building the infrastructure for cloud security a solutions view Raghu Yeluri, Enrique Castro-Leon |
title_short | Building the infrastructure for cloud security |
title_sort | building the infrastructure for cloud security a solutions view |
title_sub | a solutions view |
topic | Cloud computing Security measures Data encryption (Computer science) computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Infonuagique ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
topic_facet | Cloud computing Security measures Data encryption (Computer science) computerwetenschappen computer sciences gegevensbeheer data management Information and Communication Technology (General) Informatie- en communicatietechnologie (algemeen) Infonuagique ; Sécurité ; Mesures Chiffrement (Informatique) Computer science |
work_keys_str_mv | AT yeluriraghu buildingtheinfrastructureforcloudsecurityasolutionsview AT castroleonenrique buildingtheinfrastructureforcloudsecurityasolutionsview |