Privacy and security for cloud computing:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Springer
2013
|
Schriftenreihe: | Computer communications and networks
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVI, 306 S.) graph. Darst. |
ISBN: | 9781447141891 |
DOI: | 10.1007/978-1-4471-4189-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV040443743 | ||
003 | DE-604 | ||
005 | 20130418 | ||
007 | cr|uuu---uuuuu | ||
008 | 120926s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781447141891 |c Online |9 978-1-4471-4189-1 | ||
024 | 7 | |a 10.1007/978-1-4471-4189-1 |2 doi | |
035 | |a (OCoLC)824651709 | ||
035 | |a (DE-599)BVBBV040443743 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 003.3 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
245 | 1 | 0 | |a Privacy and security for cloud computing |c Siani Pearson ... (Eds.) |
264 | 1 | |a London [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XVI, 306 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Computer communications and networks | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Pearson, Siani |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4471-4188-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4471-4189-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025291524 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-4189-1 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804149501221404672 |
---|---|
adam_text | PRIVACY AND SECURITY FOR CLOUD COMPUTING
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PART I: INTRODUCTION TO THE ISSUES
PRIVACY, SECURITY AND TRUST IN CLOUD COMPUTING
PART II: LAW ENFORCEMENT AND AUDITS
ACCESSING DATA IN THE CLOUD: THE LONG ARM OF THE LAW ENFORCEMENT AGENT
A PRIVACY IMPACT ASSESSMENT TOOL FOR CLOUD COMPUTING
UNDERSTANDING CLOUD AUDITS
PART III: SECURITY AND INTEGRITY
SECURITY INFRASTRUCTURE FOR DYNAMICALLY PROVISIONED CLOUD INFRASTRUCTURE
SERVICES
MODELING THE RUNTIME INTEGRITY OF CLOUD SERVERS: A SCOPED INVARIANT
PERSPECTIVE
PART IV: RISK CONSIDERATIONS
INADEQUACIES OF CURRENT RISK CONTROLS FOR THE CLOUD
ENTERPRISE INFORMATION RISK MANAGEMENT: DEALING WITH CLOUD COMPUTING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
PRIVACY AND SECURITY FOR CLOUD COMPUTING
/
: 2013
ABSTRACT / INHALTSTEXT
DESPITE THE ENORMOUS POTENTIAL OF CLOUD COMPUTING, CONSUMER UNCERTAINTY
AND CONCERN REGARDING ISSUES OF PRIVACY, SECURITY AND TRUST REMAIN A
MAJOR BARRIER TO THE SWITCH TO CLOUD MODELS. THIS COMPREHENSIVE AND
AUTHORITATIVE TEXT/REFERENCE PROVIDES AN IN-DEPTH ANALYSIS OF THE LATEST
ADVANCES IN PRIVACY, SECURITY AND RISK TECHNOLOGIES WITHIN CLOUD
ENVIRONMENTS. CONTAINING CONTRIBUTIONS FROM LEADING EXPERTS IN THE
FIELD, THE TEXT PRESENTS BOTH A THOROUGH INTRODUCTION TO THE CORE
ISSUES, AND A PRACTICAL SELECTION OF INNOVATIVE SOLUTIONS TO COMMON
PROBLEMS. A GLOSSARY IS ALSO INCLUDED AT THE END OF THE BOOK. TOPICS AND
FEATURES: CONSIDERS THE VARIOUS FORENSIC CHALLENGES FOR LEGAL ACCESS TO
DATA IN A CLOUD COMPUTING ENVIRONMENT DISCUSSES PRIVACY IMPACT
ASSESSMENTS FOR THE CLOUD, AND EXAMINES THE USE OF CLOUD AUDITS TO
ATTENUATE CLOUD SECURITY PROBLEMS REVIEWS CONCEPTUAL ISSUES, BASIC
REQUIREMENTS AND PRACTICAL SUGGESTIONS FOR PROVISIONING DYNAMICALLY
CONFIGURED ACCESS CONTROL SERVICES IN THE CLOUD PROPOSES SCOPED
INVARIANTS AS A PRIMITIVE FOR ANALYZING A CLOUD SERVER FOR ITS INTEGRITY
PROPERTIES INVESTIGATES THE APPLICABILITY OF EXISTING CONTROLS FOR
MITIGATING INFORMATION SECURITY RISKS TO CLOUD COMPUTING ENVIRONMENTS
DESCRIBES RISK MANAGEMENT FOR CLOUD COMPUTING FROM AN ENTERPRISE
PERSPECTIVE THIS PIONEERING VOLUME IS ESSENTIAL READING FOR BUSINESS
PROFESSIONALS, STUDENTS AND RESEARCHERS INTERESTED IN THE FIELD OF
PRIVACY AND SECURITY PROTECTION FOR THE CLOUD, AND/OR COMPLEX SERVICE
PROVISIONING. NEWCOMERS TO THESE AREAS WILL BENEFIT FROM THE SOLID
OVERVIEW OF THE FIELD, WHEREAS ESTABLISHED EXPERTS WILL VALUE THE NOVEL,
CUTTING-EDGE RESEARCH DESCRIBED IN THE WORK
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040443743 |
classification_rvk | ST 277 ST 200 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)824651709 (DE-599)BVBBV040443743 |
dewey-full | 003.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.3 |
dewey-search | 003.3 |
dewey-sort | 13.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4471-4189-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03381nmm a2200625 c 4500</leader><controlfield tag="001">BV040443743</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130418 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">120926s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781447141891</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4471-4189-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4471-4189-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)824651709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040443743</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy and security for cloud computing</subfield><subfield code="c">Siani Pearson ... (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 306 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer communications and networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pearson, Siani</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4471-4188-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025291524</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-4189-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV040443743 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:24:02Z |
institution | BVB |
isbn | 9781447141891 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025291524 |
oclc_num | 824651709 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVI, 306 S.) graph. Darst. |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series2 | Computer communications and networks |
spelling | Privacy and security for cloud computing Siani Pearson ... (Eds.) London [u.a.] Springer 2013 1 Online-Ressource (XVI, 306 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Computer communications and networks Datensicherung (DE-588)4011144-1 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Cloud Computing (DE-588)7623494-0 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s 2\p DE-604 Pearson, Siani Sonstige oth Erscheint auch als Druckausgabe 978-1-4471-4188-4 https://doi.org/10.1007/978-1-4471-4189-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Privacy and security for cloud computing Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)7623494-0 (DE-588)4123980-5 (DE-588)4143413-4 |
title | Privacy and security for cloud computing |
title_auth | Privacy and security for cloud computing |
title_exact_search | Privacy and security for cloud computing |
title_full | Privacy and security for cloud computing Siani Pearson ... (Eds.) |
title_fullStr | Privacy and security for cloud computing Siani Pearson ... (Eds.) |
title_full_unstemmed | Privacy and security for cloud computing Siani Pearson ... (Eds.) |
title_short | Privacy and security for cloud computing |
title_sort | privacy and security for cloud computing |
topic | Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Datensicherung Cloud Computing Privatsphäre Aufsatzsammlung |
url | https://doi.org/10.1007/978-1-4471-4189-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025291524&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pearsonsiani privacyandsecurityforcloudcomputing |