Cloud Computing Security, 2nd Edition [electronic resource] / Vacca, John.
Material type: TextPublisher: CRC Press, 2020Edition: 2nd editionDescription: 1 online resource (522 pages)Content type:- text
- computer
- online resource
- 9780429619649
- 0429619642
- Cloud computing -- Security measures
- Computer networks -- Security measures
- Data protection
- Computer security
- Computer Security
- Infonuagique -- S�ecurit�e -- Mesures
- Reseaux d'ordinateurs -- SecuritY -- Mesures
- Protection de l'information (Informatique)
- SecuritY information
- Computer networks -- Security measures
- Computer security
- Data protection
- TR 005.8 VACÂ 23
- QA76.585
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Botho University Lesotho Reference | Information Technology | TR 005.8 VAC (Browse shelf(Opens below)) | 1 | Available | BULES24084097 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 005.8 VAC (Browse shelf(Opens below)) | 2 | Available | BULES24084098 |
Browsing Botho University Lesotho shelves, Shelving location: Reference, Collection: Information Technology Close shelf browser (Hides shelf browser)
TR 005.7565 SYV Murach's SQL server 2019 for developers : training and reference / | TR 005.7565 SYV Murach's SQL server 2016 for developers : training & reference / | TR 005.7585 Murach's SQL server 2012 for developers : training & reference | TR 005.8 VAC Cloud Computing Security, 2nd Edition |
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Copyright CRC Press 2020 2020
Made available through: Safari, an O'Reilly Media Company.
Online resource; Title from title page (viewed November 9, 2020)
There are no comments on this title.