The Resource Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif
Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif
Resource Information
The item Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security<p
- Language
- eng
- Edition
- 1st ed.
- Extent
- 1 online resource (xvii, 312 pages)
- Contents
-
- Introduction
- What is cloud computing?
- Infrastructure security
- Data security and storage
- Identity and access management
- Security management in the cloud
- Privacy
- Audit and compliance
- Examples of cloud service providers
- Security-as-a-[cloud] service
- The impact of cloud computing on the role of corporate IT
- Conclusion, and the future of the cloud
- Isbn
- 9781449379513
- Label
- Cloud security and privacy
- Title
- Cloud security and privacy
- Statement of responsibility
- Tim Mather, Subra Kumaraswamy, and Shahed Latif
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Cloud Computing
- Cloud computing -- Security measures
- Cloud computing -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computersicherheit
- Délits informatiques
- Electronic book
- Informatique en nuage
- Réseaux informatiques
- Sicherheitsmassnahme
- Sécurité informatique
- Technologies de l'information et de la communication
- Language
- eng
- Summary
- You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security<p
- Cataloging source
- UMI
- http://library.link/vocab/creatorName
- Mather, Tim
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- TK5105.59
- LC item number
- .M38 2009
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Kumaraswamy, Subra
- Latif, Shahed
- Series statement
- Theory in practice
- http://library.link/vocab/subjectName
-
- Computer networks
- Cloud computing
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer networks
- Cloud computing
- Computer networks
- Cloud Computing
- Computersicherheit
- Sicherheitsmassnahme
- Réseaux informatiques
- Informatique en nuage
- Technologies de l'information et de la communication
- Sécurité informatique
- Délits informatiques
- Label
- Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud
- Control code
- 496000431
- Dimensions
- unknown
- Edition
- 1st ed.
- Extent
- 1 online resource (xvii, 312 pages)
- Form of item
- online
- Isbn
- 9781449379513
- Lccn
- 2010281455
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
-
- cl0500000054
- 114fe899-e392-40c7-b0d5-70c2b6616bc0
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)496000431
- Label
- Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud
- Control code
- 496000431
- Dimensions
- unknown
- Edition
- 1st ed.
- Extent
- 1 online resource (xvii, 312 pages)
- Form of item
- online
- Isbn
- 9781449379513
- Lccn
- 2010281455
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
-
- cl0500000054
- 114fe899-e392-40c7-b0d5-70c2b6616bc0
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)496000431
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Cloud Computing
- Cloud computing -- Security measures
- Cloud computing -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computersicherheit
- Délits informatiques
- Electronic book
- Informatique en nuage
- Réseaux informatiques
- Sicherheitsmassnahme
- Sécurité informatique
- Technologies de l'information et de la communication
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cloud-security-and-privacy-Tim-Mather-Subra/W_gMjcgxC4E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cloud-security-and-privacy-Tim-Mather-Subra/W_gMjcgxC4E/">Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cloud-security-and-privacy-Tim-Mather-Subra/W_gMjcgxC4E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cloud-security-and-privacy-Tim-Mather-Subra/W_gMjcgxC4E/">Cloud security and privacy, Tim Mather, Subra Kumaraswamy, and Shahed Latif</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>