000 | 03908cam a22006857a 4500 | ||
---|---|---|---|
001 | on1288628448 | ||
003 | OCoLC | ||
005 | 20240806150030.0 | ||
006 | m o d | ||
007 | cr cnu|||||||| | ||
008 | 171121s2020 xx o 000 0 eng d | ||
020 |
_a9780429619649 _q(electronic bk.) |
||
020 |
_a0429619642 _q(electronic bk.) |
||
020 | _z036756033X | ||
020 | _z0429055129 | ||
020 | _z0367151162 | ||
020 | _z9780367151164 | ||
020 | _z9780367560331 | ||
020 | _z9780429055126 | ||
024 | 8 | _aKE73628 | |
024 | 8 | _a9780429619649 | |
029 | 0 |
_aAU@ _b000070307962 |
|
035 | _a(OCoLC)1288628448 | ||
037 |
_a9780429619649 _bO'Reilly Media |
||
040 |
_aAU@ _beng _cAU@ _dORMDA _dOCLCO _dOCLCF _dOCLCQ _dOCLCO _dOCLCL |
||
050 | 4 | _aQA76.585 | |
082 | 0 | 4 |
_aTR 005.8 VAC _223 |
100 | 1 |
_aVacca, John, _eauthor. |
|
245 | 1 | 0 |
_aCloud Computing Security, 2nd Edition _h[electronic resource] / _cVacca, John. |
250 | _a2nd edition. | ||
264 | 1 |
_bCRC Press, _c2020. |
|
300 | _a1 online resource (522 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 | _atext file | ||
520 | _aThis handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features • Covers patching and configuration vulnerabilities of a cloud server • Evaluates methods for data encryption and long-term storage in a cloud server • Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. | ||
542 |
_fCopyright CRC Press 2020 _g2020 |
||
550 | _aMade available through: Safari, an O'Reilly Media Company. | ||
588 | _aOnline resource; Title from title page (viewed November 9, 2020) | ||
650 | 0 |
_aCloud computing _xSecurity measures. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aComputer security. | |
650 | 2 | _aComputer Security | |
650 | 6 |
_aInfonuagique _xS�ecurit�e _xMesures. |
|
650 | 6 |
_aReseaux d'ordinateurs _xSecuritY _xMesures. |
|
650 | 6 | _aProtection de l'information (Informatique) | |
650 | 6 | _aSecuritY information | |
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aData protection _2fast |
|
710 | 2 | _aSafari, an O'Reilly Media Company. | |
758 |
_ihas work: _aCloud Computing Security, 2nd Edition (Text) _1https://id.oclc.org/worldcat/entity/E39PCYbHQTcvxp7YywC4ky88JC _4https://id.oclc.org/worldcat/ontology/hasWork |
||
856 | 4 | 0 | _uhttps://go.oreilly.com/queensland-university-of-technology/library/view/-/9780429619649/?ar |
856 | 4 | 0 |
_3O'Reilly Media _uhttps://www.oreilly.com/library/view/-/9780429619649/ |
856 | 4 |
_3Image _uhttps://www.oreilly.com/covers/urn:orm:book:9780429619649/ |
|
942 |
_2ddc _cBK _n0 |
||
948 | _hNO HOLDINGS IN GHUCC - 204 OTHER HOLDINGS | ||
999 |
_c7492 _d7492 |