Cloud Computing Security, 2nd Edition [electronic resource] / Vacca, John.
Material type: TextPublisher: CRC Press, 2020Edition: 2nd editionDescription: 1 online resource (522 pages)Content type:- text
- computer
- online resource
- 9780429619649
- 0429619642
- Cloud computing -- Security measures
- Computer networks -- Security measures
- Data protection
- Computer security
- Computer Security
- Infonuagique -- S�ecurit�e -- Mesures
- Reseaux d'ordinateurs -- SecuritY -- Mesures
- Protection de l'information (Informatique)
- SecuritY information
- Computer networks -- Security measures
- Computer security
- Data protection
- TR 005.8 VACÂ 23
- QA76.585
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Botho University Lesotho Reference | Information Technology | TR 005.8 VAC (Browse shelf(Opens below)) | 1 | Available | BULES24084097 | ||
Books | Botho University Lesotho Reference | Information Technology | REF 005.8 VAC (Browse shelf(Opens below)) | 2 | Available | BULES24084098 |
Browsing Botho University Lesotho shelves, Shelving location: Reference, Collection: Information Technology Close shelf browser (Hides shelf browser)
REF 005.8 DUL CompTIA Security+ deluxe study guide : exam SY0-501 / | REF 005.8 ERI Hacking : the art of exploitation | REF 005.8 JON Real digital forensics computer security and incident response | REF 005.8 VAC Cloud Computing Security, 2nd Edition | REF 005.8076 CHA (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition | REF 006.76 MAT Creating mobile apps with jQuery mobile | REF 006.786 CHU Adobe Flash Professional CS5 : classroom in a book : the official training workbook from Adobe Systems. |
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Copyright CRC Press 2020 2020
Made available through: Safari, an O'Reilly Media Company.
Online resource; Title from title page (viewed November 9, 2020)
There are no comments on this title.