MARC details
| 000 -LEADER |
| fixed length control field |
05227cam a2200565 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
880672205 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20201005142058.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr ||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
140527r2015 ii a ob 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2014020190 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Cancelled/invalid ISBN |
9788126556236 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)880672205 |
| 037 ## - SOURCE OF ACQUISITION |
| Stock number |
9144F636-2885-405B-8EC3-BC76273EF2BA |
| Source of stock number/acquisition |
OverDrive, Inc. |
| Note |
http://www.overdrive.com |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Description conventions |
rda |
| Language of cataloging |
eng |
| Transcribing agency |
DLC |
| Modifying agency |
YDX |
| -- |
OCLCO |
| -- |
IDEBK |
| -- |
N$T |
| -- |
TEFOD |
| -- |
DG1 |
| -- |
E7B |
| -- |
YDXCP |
| -- |
EG-NcFUE |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 14 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.585 |
| Item number |
.A23 2014 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
013000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
014000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
018000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
067000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
032000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
037000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
052000 |
| Source |
bisacsh |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
004.6782 |
| Edition number |
23 |
| Item number |
A.I.C |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Abbadi, Imad M., |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cloud management and security / |
| Statement of responsibility, etc |
Imad M. Abbadi. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New Delhi : |
| Name of publisher, distributor, etc |
Wiley, |
| Date of publication, distribution, etc |
2015. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxii, 216 pages ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Source |
rdacontent. |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Source |
rdamedia. |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Source |
rdacarrier. |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2016 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Preface<br/><br/>References<br/><br/> <br/><br/>1 Introduction<br/><br/>1.1 Overview<br/><br/>1.2 Cloud definition<br/><br/>1.3 Cloud evolution<br/><br/>1.4 Cloud services<br/><br/>1.5 Cloud deployment types<br/><br/>1.6 Main challenges of Clouds<br/><br/>1.7 Summary<br/><br/>1.8 Exercises<br/><br/> <br/><br/>Part One Cloud management<br/><br/>2 Cloud Structure<br/><br/>2.1 Introduction<br/><br/>2.2 Infrastructure components<br/><br/>2.3 Cloud Layers<br/><br/>2.4 Cloud relations<br/><br/>2.5 Cloud dynamics<br/><br/>2.6 Data types<br/><br/>2.7 Summary<br/><br/>2.8 Exercises<br/><br/> <br/><br/>3 Fundamentals of Cloud management<br/><br/>3.1 Introduction<br/><br/>3.2 Clouds management services<br/><br/>3.3 Virtual control center<br/><br/>3.4 Prerequisite input-data for the management services<br/><br/>3.5 Management of user requirements<br/><br/>3.6 Summary<br/><br/>3.7 Exercises<br/><br/> <br/><br/>4 Cloud properties<br/><br/>4.1 Introduction<br/><br/>4.2 Adaptability property<br/><br/>4.3 Resilience property<br/><br/>4.4 Scalability property<br/><br/>4.5 Availability property<br/><br/>4.6 Reliability property<br/><br/>4.7 Security and privacy property<br/><br/>4.8 Business model<br/><br/>4.9 Summary<br/><br/>4.10 Exercises<br/><br/> <br/><br/>5 Automated management services<br/><br/>5.1 Introduction<br/><br/>5.2 Virtual layer self-managed services<br/><br/>5.3 Virtual services interdependency<br/><br/>5.4 Application layer self-managed services<br/><br/>5.5 Application services interdependency<br/><br/>5.6 Security and privacy by design<br/><br/>5.7 Multi-tier application deployment in the Cloud<br/><br/>5.8 Main challenges and requirements<br/><br/>5.9 Summary<br/><br/>5.10 Exercises<br/><br/> <br/><br/>Part Two Clouds security fundamentals<br/><br/>6 Background<br/><br/>6.1 Topics flow<br/><br/>6.2 Trusted Computing<br/><br/>6.3 Summary<br/><br/> <br/><br/>7 Challenges for establishing trust in Clouds<br/><br/>7.1 Introduction<br/><br/>7.2 Effects of Cloud dynamism on trust relationships<br/><br/>7.3 Challenges<br/><br/>7.4 Summary<br/><br/>7.5 Exercises<br/><br/> <br/><br/>8 Establishing trust in Clouds<br/><br/>8.1 Introduction<br/><br/>8.2 Organization requirements<br/><br/>8.3 Framework requirements<br/><br/>8.4 Device properties<br/><br/>8.5 Framework architecture<br/><br/>8.6 Required software agents<br/><br/>8.7 Framework workflow<br/><br/>8.8 Discussion and analysis<br/><br/>8.9 Summary<br/><br/>8.10 Exercises<br/><br/> <br/><br/>9 Clouds chains of trust<br/><br/>9.1 Introduction<br/><br/>9.2 Software agents revision<br/><br/>9.3 Roots of and chains of trust definition<br/><br/>9.4 Intra-layer chains of trust<br/><br/>9.5 Trust across layers<br/><br/>9.6 Summary<br/><br/>9.7 Exercises<br/><br/> <br/><br/>10 Provenance in Clouds<br/><br/>10.1 Introduction<br/><br/>10.2 Motivating scenarios<br/><br/>10.3 Log records management and requirements<br/><br/>10.4 Framework domain architecture<br/><br/>10.5 Framework software agents<br/><br/>10.6 Framework workflow<br/><br/>10.7 Threat analysis<br/><br/>10.8 Discussion and future directions<br/><br/>10.9 Exercises<br/><br/> <br/><br/>11 Insiders<br/><br/>11.1 Introduction<br/><br/>11.2 Insiders definition<br/><br/>11.3 Conceptual models<br/><br/>11.4 Summary<br/><br/>11.5 Exercises<br/><br/> <br/><br/>Part Three Practical examples<br/><br/>12 Real life examples<br/><br/>12.1 Open Stack<br/><br/>12.2 Amazon web services<br/><br/>12.3 Component architecture<br/><br/>12.4 Prototype<br/><br/>12.5 Summary<br/><br/> <br/><br/>13 Case Study<br/><br/>13.1 Scenario<br/><br/>13.2 Home healthcare architecture in the Cloud<br/><br/>13.3 Insiders analysis for home healthcare<br/><br/>13.4 Cloud threats |
| 506 ## - RESTRICTIONS ON ACCESS NOTE |
| Terms governing access |
Available to OhioLINK libraries. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- |
| Assigning source |
Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cloud computing. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Web services. |
| 9 (RLIN) |
970 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 655 #4 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
Ohio Library and Information Network. |
| 730 0# - ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Wiley online library. |
| Institution to which field applies |
OCU. |
| 730 0# - ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Wiley InterScience ebooks. |
| Institution to which field applies |
OCU. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Display text |
Print version: |
| Main entry heading |
Abbadi, Imad M., author. |
| Title |
Cloud management and security |
| Place, publisher, and date of publication |
Chichester, West Sussex ; Hoboken, NJ : Wiley, 2014 |
| International Standard Book Number |
9781118817094 |
| Record control number |
(DLC) 2014011409. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Wiley Online Library : |
| Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a> |
| Public note |
Connect to resource online |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Wiley Online Library : |
| Uniform Resource Identifier |
<a href="http://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087">http://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087</a> |
| Public note |
Connect to resource online (Off Campus Access) |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |