Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Cloud management and security / (Record no. 10563)

MARC details
000 -LEADER
fixed length control field 05227cam a2200565 i 4500
001 - CONTROL NUMBER
control field 880672205
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201005142058.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140527r2015 ii a ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014020190
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9788126556236
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)880672205
037 ## - SOURCE OF ACQUISITION
Stock number 9144F636-2885-405B-8EC3-BC76273EF2BA
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Description conventions rda
Language of cataloging eng
Transcribing agency DLC
Modifying agency YDX
-- OCLCO
-- IDEBK
-- N$T
-- TEFOD
-- DG1
-- E7B
-- YDXCP
-- EG-NcFUE
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
Item number .A23 2014
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 013000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 014000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 018000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 067000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 037000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 052000
Source bisacsh
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6782
Edition number 23
Item number A.I.C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Abbadi, Imad M.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cloud management and security /
Statement of responsibility, etc Imad M. Abbadi.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 216 pages ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier.
500 ## - GENERAL NOTE
General note computer bookfair2016
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface<br/><br/>References<br/><br/> <br/><br/>1 Introduction<br/><br/>1.1 Overview<br/><br/>1.2 Cloud definition<br/><br/>1.3 Cloud evolution<br/><br/>1.4 Cloud services<br/><br/>1.5 Cloud deployment types<br/><br/>1.6 Main challenges of Clouds<br/><br/>1.7 Summary<br/><br/>1.8 Exercises<br/><br/> <br/><br/>Part One Cloud management<br/><br/>2 Cloud Structure<br/><br/>2.1 Introduction<br/><br/>2.2 Infrastructure components<br/><br/>2.3 Cloud Layers<br/><br/>2.4 Cloud relations<br/><br/>2.5 Cloud dynamics<br/><br/>2.6 Data types<br/><br/>2.7 Summary<br/><br/>2.8 Exercises<br/><br/> <br/><br/>3 Fundamentals of Cloud management<br/><br/>3.1 Introduction<br/><br/>3.2 Clouds management services<br/><br/>3.3 Virtual control center<br/><br/>3.4 Prerequisite input-data for the management services<br/><br/>3.5 Management of user requirements<br/><br/>3.6 Summary<br/><br/>3.7 Exercises<br/><br/> <br/><br/>4 Cloud properties<br/><br/>4.1 Introduction<br/><br/>4.2 Adaptability property<br/><br/>4.3 Resilience property<br/><br/>4.4 Scalability property<br/><br/>4.5 Availability property<br/><br/>4.6 Reliability property<br/><br/>4.7 Security and privacy property<br/><br/>4.8 Business model<br/><br/>4.9 Summary<br/><br/>4.10 Exercises<br/><br/> <br/><br/>5 Automated management services<br/><br/>5.1 Introduction<br/><br/>5.2 Virtual layer self-managed services<br/><br/>5.3 Virtual services interdependency<br/><br/>5.4 Application layer self-managed services<br/><br/>5.5 Application services interdependency<br/><br/>5.6 Security and privacy by design<br/><br/>5.7 Multi-tier application deployment in the Cloud<br/><br/>5.8 Main challenges and requirements<br/><br/>5.9 Summary<br/><br/>5.10 Exercises<br/><br/> <br/><br/>Part Two Clouds security fundamentals<br/><br/>6 Background<br/><br/>6.1 Topics flow<br/><br/>6.2 Trusted Computing<br/><br/>6.3 Summary<br/><br/> <br/><br/>7 Challenges for establishing trust in Clouds<br/><br/>7.1 Introduction<br/><br/>7.2 Effects of Cloud dynamism on trust relationships<br/><br/>7.3 Challenges<br/><br/>7.4 Summary<br/><br/>7.5 Exercises<br/><br/> <br/><br/>8 Establishing trust in Clouds<br/><br/>8.1 Introduction<br/><br/>8.2 Organization requirements<br/><br/>8.3 Framework requirements<br/><br/>8.4 Device properties<br/><br/>8.5 Framework architecture<br/><br/>8.6 Required software agents<br/><br/>8.7 Framework workflow<br/><br/>8.8 Discussion and analysis<br/><br/>8.9 Summary<br/><br/>8.10 Exercises<br/><br/> <br/><br/>9 Clouds chains of trust<br/><br/>9.1 Introduction<br/><br/>9.2 Software agents revision<br/><br/>9.3 Roots of and chains of trust definition<br/><br/>9.4 Intra-layer chains of trust<br/><br/>9.5 Trust across layers<br/><br/>9.6 Summary<br/><br/>9.7 Exercises<br/><br/> <br/><br/>10 Provenance in Clouds<br/><br/>10.1 Introduction<br/><br/>10.2 Motivating scenarios<br/><br/>10.3 Log records management and requirements<br/><br/>10.4 Framework domain architecture<br/><br/>10.5 Framework software agents<br/><br/>10.6 Framework workflow<br/><br/>10.7 Threat analysis<br/><br/>10.8 Discussion and future directions<br/><br/>10.9 Exercises<br/><br/> <br/><br/>11 Insiders<br/><br/>11.1 Introduction<br/><br/>11.2 Insiders definition<br/><br/>11.3 Conceptual models<br/><br/>11.4 Summary<br/><br/>11.5 Exercises<br/><br/> <br/><br/>Part Three Practical examples<br/><br/>12 Real life examples<br/><br/>12.1 Open Stack<br/><br/>12.2 Amazon web services<br/><br/>12.3 Component architecture<br/><br/>12.4 Prototype<br/><br/>12.5 Summary<br/><br/> <br/><br/>13 Case Study<br/><br/>13.1 Scenario<br/><br/>13.2 Home healthcare architecture in the Cloud<br/><br/>13.3 Insiders analysis for home healthcare<br/><br/>13.4 Cloud threats
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available to OhioLINK libraries.
520 ## - SUMMARY, ETC.
Summary, etc "This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Web services.
9 (RLIN) 970
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Ohio Library and Information Network.
730 0# - ADDED ENTRY--UNIFORM TITLE
Uniform title Wiley online library.
Institution to which field applies OCU.
730 0# - ADDED ENTRY--UNIFORM TITLE
Uniform title Wiley InterScience ebooks.
Institution to which field applies OCU.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Abbadi, Imad M., author.
Title Cloud management and security
Place, publisher, and date of publication Chichester, West Sussex ; Hoboken, NJ : Wiley, 2014
International Standard Book Number 9781118817094
Record control number (DLC) 2014011409.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Wiley Online Library :
Uniform Resource Identifier <a href="http://dx.doi.org/10.1002/9781118817087">http://dx.doi.org/10.1002/9781118817087</a>
Public note Connect to resource online
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Wiley Online Library :
Uniform Resource Identifier <a href="http://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087">http://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087</a>
Public note Connect to resource online (Off Campus Access)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A1 15/02/2016 Sphinx publishing 198.00 Purchase   004.6782 A.I.C 00014268 18/02/2025 15/02/2016 Books