Auditing cloud computing: a security and privacy guide
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
John Wiley & Sons
c2011
|
Schlagworte: | |
Online-Zugang: | TUM01 Volltext |
Beschreibung: | Includes bibliographical references and index "The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"-- |
Beschreibung: | 1 Online-Ressource (xvi, 206 p.) |
ISBN: | 111811602X 1118116038 1118116046 1118269098 9781118116029 9781118116036 9781118116043 9781118269091 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040466866 | ||
003 | DE-604 | ||
005 | 20130723 | ||
007 | cr|uuu---uuuuu | ||
008 | 121010s2011 |||| o||u| ||||||eng d | ||
020 | |a 111811602X |c electronic bk. |9 1-118-11602-X | ||
020 | |a 1118116038 |c electronic bk. |9 1-118-11603-8 | ||
020 | |a 1118116046 |c electronic bk. |9 1-118-11604-6 | ||
020 | |a 1118269098 |c electronic bk. |9 1-118-26909-8 | ||
020 | |a 9781118116029 |c electronic bk. |9 978-1-118-11602-9 | ||
020 | |a 9781118116036 |c electronic bk. |9 978-1-118-11603-6 | ||
020 | |a 9781118116043 |c electronic bk. |9 978-1-118-11604-3 | ||
020 | |a 9781118269091 |c electronic bk. |9 978-1-118-26909-1 | ||
035 | |a (OCoLC)874189509 | ||
035 | |a (DE-599)BVBBV040466866 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
084 | |a WIR 547f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Auditing cloud computing |b a security and privacy guide |c [edited by] Ben Halpert |
264 | 1 | |a Hoboken, N.J. |b John Wiley & Sons |c c2011 | |
300 | |a 1 Online-Ressource (xvi, 206 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a "The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"-- | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a COMPUTERS / Internet / Security / bisacsh | |
650 | 4 | |a COMPUTERS / Networking / Security / bisacsh | |
650 | 4 | |a COMPUTERS / Security / General / bisacsh | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Management Auditing |0 (DE-588)4267800-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Management Auditing |0 (DE-588)4267800-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Halpert, Ben |d 1986- |e Sonstige |0 (DE-588)1015098940 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 0-470-87474-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-470-87474-5 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143 |x Verlag |3 Volltext |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025314245 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143 |l TUM01 |p ZDB-4-NLEBK |q TUM_PDA_EBSCO_BAE_gekauft |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804149531285127168 |
---|---|
any_adam_object | |
author_GND | (DE-588)1015098940 |
building | Verbundindex |
bvnumber | BV040466866 |
classification_rvk | ST 200 ST 277 |
classification_tum | DAT 250f WIR 547f DAT 050f |
collection | ZDB-4-NLEBK |
ctrlnum | (OCoLC)874189509 (DE-599)BVBBV040466866 |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04680nmm a2200781zc 4500</leader><controlfield tag="001">BV040466866</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130723 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">121010s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111811602X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-11602-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118116038</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-11603-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118116046</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-11604-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118269098</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-26909-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118116029</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-11602-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118116036</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-11603-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118116043</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-11604-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118269091</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-26909-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874189509</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040466866</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 547f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Auditing cloud computing</subfield><subfield code="b">a security and privacy guide</subfield><subfield code="c">[edited by] Ben Halpert</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 206 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Internet / Security / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General / bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Management Auditing</subfield><subfield code="0">(DE-588)4267800-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Management Auditing</subfield><subfield code="0">(DE-588)4267800-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Halpert, Ben</subfield><subfield code="d">1986-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1015098940</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">0-470-87474-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-470-87474-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025314245</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">TUM_PDA_EBSCO_BAE_gekauft</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040466866 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:24:30Z |
institution | BVB |
isbn | 111811602X 1118116038 1118116046 1118269098 9781118116029 9781118116036 9781118116043 9781118269091 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025314245 |
oclc_num | 874189509 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 206 p.) |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK TUM_PDA_EBSCO_BAE_gekauft |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Auditing cloud computing a security and privacy guide [edited by] Ben Halpert Hoboken, N.J. John Wiley & Sons c2011 1 Online-Ressource (xvi, 206 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index "The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"-- COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Unternehmen Business enterprises / Computer networks / Security measures Cloud computing / Security measures Information technology / Security measures Data protection COMPUTERS / Internet / Security / bisacsh COMPUTERS / Networking / Security / bisacsh COMPUTERS / Security / General / bisacsh Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Management Auditing (DE-588)4267800-6 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s Management Auditing (DE-588)4267800-6 s DE-604 Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Halpert, Ben 1986- Sonstige (DE-588)1015098940 oth Erscheint auch als Druckausgabe 0-470-87474-0 Erscheint auch als Druckausgabe 978-0-470-87474-5 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Auditing cloud computing a security and privacy guide COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Unternehmen Business enterprises / Computer networks / Security measures Cloud computing / Security measures Information technology / Security measures Data protection COMPUTERS / Internet / Security / bisacsh COMPUTERS / Networking / Security / bisacsh COMPUTERS / Security / General / bisacsh Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Management Auditing (DE-588)4267800-6 gnd Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4267800-6 (DE-588)7623494-0 (DE-588)4011144-1 |
title | Auditing cloud computing a security and privacy guide |
title_auth | Auditing cloud computing a security and privacy guide |
title_exact_search | Auditing cloud computing a security and privacy guide |
title_full | Auditing cloud computing a security and privacy guide [edited by] Ben Halpert |
title_fullStr | Auditing cloud computing a security and privacy guide [edited by] Ben Halpert |
title_full_unstemmed | Auditing cloud computing a security and privacy guide [edited by] Ben Halpert |
title_short | Auditing cloud computing |
title_sort | auditing cloud computing a security and privacy guide |
title_sub | a security and privacy guide |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Unternehmen Business enterprises / Computer networks / Security measures Cloud computing / Security measures Information technology / Security measures Data protection COMPUTERS / Internet / Security / bisacsh COMPUTERS / Networking / Security / bisacsh COMPUTERS / Security / General / bisacsh Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Management Auditing (DE-588)4267800-6 gnd Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Unternehmen Business enterprises / Computer networks / Security measures Cloud computing / Security measures Information technology / Security measures Data protection COMPUTERS / Internet / Security / bisacsh COMPUTERS / Networking / Security / bisacsh COMPUTERS / Security / General / bisacsh Datenschutz Computersicherheit Management Auditing Cloud Computing Datensicherung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382143 |
work_keys_str_mv | AT halpertben auditingcloudcomputingasecurityandprivacyguide |