| 000 | 01482cam a2200313 a 4500 | ||
|---|---|---|---|
| 999 |
_c7240 _d7240 |
||
| 001 | 16754491 | ||
| 005 | 20190509132332.0 | ||
| 008 | 110428s2011 mau b 001 0 eng | ||
| 010 | _a 2011012004 | ||
| 020 | _a9781597495929 (pbk. : alk. paper) | ||
| 040 |
_aDLC _cDLC _dDLC _erda |
||
| 050 | 0 | 0 |
_aQA76.585 _b.W56 2011 |
| 082 | 0 | 0 |
_a005.8 _222 _bW.J.S |
| 100 | 1 |
_aWinkler, J. R. _q(Joachim R.) |
|
| 245 | 1 | 0 |
_aSecuring the cloud : _bcloud computer security techniques and tactics / _cVic J.R. Winkler. |
| 260 |
_aWaltham, MA : _bSyngress/Elsevier, _c2011. |
||
| 300 |
_a290 p. ; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud. | |
| 650 | 0 | _aCloud computing. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3487 |
||
| 942 |
_cBK _2ddc |
||