CSA guide to cloud computing implementing cloud privacy and security
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pres...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
© 2015
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126690 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780124201859 |9 978-0-12-420185-9 | ||
020 | |a 0124201857 |9 0-12-420185-7 | ||
020 | |a 0124201253 |9 0-12-420125-3 | ||
020 | |a 9780124201255 |9 978-0-12-420125-5 | ||
035 | |a (ZDB-33-ESD)ocn893919824 | ||
035 | |a (OCoLC)893919824 | ||
035 | |a (DE-599)BVBBV046126690 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.67/82 |2 23 | |
100 | 1 | |a Samani, Raj |e Verfasser |4 aut | |
245 | 1 | 0 | |a CSA guide to cloud computing |b implementing cloud privacy and security |c Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor |
246 | 1 | 3 | |a Cloud Security Alliance guide to cloud computing |
264 | 1 | |a Waltham, MA |b Syngress |c © 2015 | |
300 | |a 1 online resource (xx, 216 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing prov | ||
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Honan, Brian |4 aut | |
700 | 1 | |a Reavis, Jim |4 aut | |
700 | 1 | |a Jirasek, Vladimir |4 edt | |
710 | 2 | |a CSA (Organization)XXeissuing body |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124201255 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124201255 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507144 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124201255 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447035392000 |
---|---|
any_adam_object | |
author | Samani, Raj Honan, Brian Reavis, Jim |
author2 | Jirasek, Vladimir |
author2_role | edt |
author2_variant | v j vj |
author_facet | Samani, Raj Honan, Brian Reavis, Jim Jirasek, Vladimir |
author_role | aut aut aut |
author_sort | Samani, Raj |
author_variant | r s rs b h bh j r jr |
building | Verbundindex |
bvnumber | BV046126690 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn893919824 (OCoLC)893919824 (DE-599)BVBBV046126690 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02832nmm a2200577zc 4500</leader><controlfield tag="001">BV046126690</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201859</subfield><subfield code="9">978-0-12-420185-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124201857</subfield><subfield code="9">0-12-420185-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124201253</subfield><subfield code="9">0-12-420125-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201255</subfield><subfield code="9">978-0-12-420125-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn893919824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)893919824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126690</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Samani, Raj</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CSA guide to cloud computing</subfield><subfield code="b">implementing cloud privacy and security</subfield><subfield code="c">Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cloud Security Alliance guide to cloud computing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 216 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing prov</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Honan, Brian</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reavis, Jim</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jirasek, Vladimir</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">CSA (Organization)XXeissuing body</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124201255</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124201255</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507144</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124201255</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126690 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:54Z |
institution | BVB |
isbn | 9780124201859 0124201857 0124201253 9780124201255 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507144 |
oclc_num | 893919824 |
open_access_boolean | |
physical | 1 online resource (xx, 216 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Samani, Raj Verfasser aut CSA guide to cloud computing implementing cloud privacy and security Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor Cloud Security Alliance guide to cloud computing Waltham, MA Syngress © 2015 1 online resource (xx, 216 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing prov COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer security fast Cloud computing Cloud computing Security measures Computer security Honan, Brian aut Reavis, Jim aut Jirasek, Vladimir edt CSA (Organization)XXeissuing body Sonstige oth Erscheint auch als Druck-Ausgabe 9780124201255 http://www.sciencedirect.com/science/book/9780124201255 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Samani, Raj Honan, Brian Reavis, Jim CSA guide to cloud computing implementing cloud privacy and security COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer security fast Cloud computing Cloud computing Security measures Computer security |
title | CSA guide to cloud computing implementing cloud privacy and security |
title_alt | Cloud Security Alliance guide to cloud computing |
title_auth | CSA guide to cloud computing implementing cloud privacy and security |
title_exact_search | CSA guide to cloud computing implementing cloud privacy and security |
title_full | CSA guide to cloud computing implementing cloud privacy and security Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor |
title_fullStr | CSA guide to cloud computing implementing cloud privacy and security Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor |
title_full_unstemmed | CSA guide to cloud computing implementing cloud privacy and security Raj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor |
title_short | CSA guide to cloud computing |
title_sort | csa guide to cloud computing implementing cloud privacy and security |
title_sub | implementing cloud privacy and security |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer security fast Cloud computing Cloud computing Security measures Computer security |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Cloud computing Computer security Cloud computing Security measures |
url | http://www.sciencedirect.com/science/book/9780124201255 |
work_keys_str_mv | AT samaniraj csaguidetocloudcomputingimplementingcloudprivacyandsecurity AT honanbrian csaguidetocloudcomputingimplementingcloudprivacyandsecurity AT reavisjim csaguidetocloudcomputingimplementingcloudprivacyandsecurity AT jirasekvladimir csaguidetocloudcomputingimplementingcloudprivacyandsecurity AT csaorganizationxxeissuingbody csaguidetocloudcomputingimplementingcloudprivacyandsecurity AT samaniraj cloudsecurityallianceguidetocloudcomputing AT honanbrian cloudsecurityallianceguidetocloudcomputing AT reavisjim cloudsecurityallianceguidetocloudcomputing AT jirasekvladimir cloudsecurityallianceguidetocloudcomputing AT csaorganizationxxeissuingbody cloudsecurityallianceguidetocloudcomputing |