| 000 | 01989cam a2200445 a 4500 | ||
|---|---|---|---|
| 001 | 16385025 | ||
| 003 | BD-ChPU | ||
| 005 | 20250309110925.0 | ||
| 008 | 100810s2009 cc a b 001 0 eng d | ||
| 010 | _a 2010281455 | ||
| 015 | 
_aGBA976752 _2bnb  | 
||
| 016 | 7 | 
_a015341699 _2Uk  | 
|
| 020 | _a9780596802769 (pbk.) | ||
| 020 | _a0596802765 (pbk.) | ||
| 035 | _a(OCoLC)ocn419866951 | ||
| 040 | 
_aUKM _cUKM _dBTCTA _dBWX _dC#P _dVVC _dCHVBK _dDLC _dBD-ChPU _beng  | 
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 | 
_aTK5105.59 _b.M38 2009  | 
| 082 | 0 | 4 | 
_222 _a005.8 M427c 2009  | 
| 100 | 1 | 
_aMather, Tim. _eauthor.  | 
|
| 245 | 1 | 0 | 
_aCloud security and privacy : _ban enterprise perspective on risks and compliance / _cTim Mather, Subra Kumaraswamy and Shahed Latif.  | 
| 250 | _aFirst edition. | ||
| 260 | 
_aBeijing ; _aCambridge [Mass.] : _bO'Reilly, _cc2009.  | 
||
| 300 | 
_axvii, 312 pages : _billustrations ; _c24 cm.  | 
||
| 490 | 1 | _aTheory in practice | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud. | |
| 526 | _aComputer Science & Engineering | ||
| 650 | 0 | 
_aComputer networks _xSecurity measures. _94777  | 
|
| 650 | 0 | 
_aCloud computing _xSecurity measures.  | 
|
| 650 | 7 | 
_aCloud Computing. _2swd  | 
|
| 650 | 7 | 
_aSicherheitsmassnahme. _2swd  | 
|
| 650 | 7 | 
_aComputersicherheit. _2swd  | 
|
| 700 | 1 | 
_aKumaraswamy, Subra. _eauthor.  | 
|
| 700 | 1 | 
_aLatif, Shahed. _eauthor.  | 
|
| 830 | 0 | _aTheory in practice (Sebastopol, Calif.) | |
| 906 | 
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg  | 
||
| 942 | 
_2ddc _cBK  | 
||
| 999 | 
_c7833 _d7833  | 
||