000 03908cam a22006857a 4500
001 on1288628448
003 OCoLC
005 20240806150030.0
006 m o d
007 cr cnu||||||||
008 171121s2020 xx o 000 0 eng d
020 _a9780429619649
_q(electronic bk.)
020 _a0429619642
_q(electronic bk.)
020 _z036756033X
020 _z0429055129
020 _z0367151162
020 _z9780367151164
020 _z9780367560331
020 _z9780429055126
024 8 _aKE73628
024 8 _a9780429619649
029 0 _aAU@
_b000070307962
035 _a(OCoLC)1288628448
037 _a9780429619649
_bO'Reilly Media
040 _aAU@
_beng
_cAU@
_dORMDA
_dOCLCO
_dOCLCF
_dOCLCQ
_dOCLCO
_dOCLCL
050 4 _aQA76.585
082 0 4 _aTR 005.8 VAC
_223
100 1 _aVacca, John,
_eauthor.
245 1 0 _aCloud Computing Security, 2nd Edition
_h[electronic resource] /
_cVacca, John.
250 _a2nd edition.
264 1 _bCRC Press,
_c2020.
300 _a1 online resource (522 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
520 _aThis handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
542 _fCopyright CRC Press 2020
_g2020
550 _aMade available through: Safari, an O'Reilly Media Company.
588 _aOnline resource; Title from title page (viewed November 9, 2020)
650 0 _aCloud computing
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 0 _aComputer security.
650 2 _aComputer Security
650 6 _aInfonuagique
_xS�ecurit�e
_xMesures.
650 6 _aReseaux d'ordinateurs
_xSecuritY
_xMesures.
650 6 _aProtection de l'information (Informatique)
650 6 _aSecuritY information
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
650 7 _aData protection
_2fast
710 2 _aSafari, an O'Reilly Media Company.
758 _ihas work:
_aCloud Computing Security, 2nd Edition (Text)
_1https://id.oclc.org/worldcat/entity/E39PCYbHQTcvxp7YywC4ky88JC
_4https://id.oclc.org/worldcat/ontology/hasWork
856 4 0 _uhttps://go.oreilly.com/queensland-university-of-technology/library/view/-/9780429619649/?ar
856 4 0 _3O'Reilly Media
_uhttps://www.oreilly.com/library/view/-/9780429619649/
856 4 _3Image
_uhttps://www.oreilly.com/covers/urn:orm:book:9780429619649/
942 _2ddc
_cBK
_n0
948 _hNO HOLDINGS IN GHUCC - 204 OTHER HOLDINGS
999 _c7492
_d7492