Securing cloud and mobility: a practitioner's guide
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca, Raton, FL
CRC Press
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- Provided by publisher. Includes bibliographical references and index |
Beschreibung: | XVII, 210 S. |
ISBN: | 9781439850558 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040879051 | ||
003 | DE-604 | ||
005 | 20130701 | ||
007 | t | ||
008 | 130313s2013 xxu |||| 00||| eng d | ||
010 | |a 2012036919 | ||
020 | |a 9781439850558 |c hardback |9 978-1-4398-5055-8 | ||
035 | |a (OCoLC)840765227 | ||
035 | |a (DE-599)BVBBV040879051 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-29T | ||
050 | 0 | |a QA76.585 | |
082 | 0 | |a 005.8 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Lim, Ian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing cloud and mobility |b a practitioner's guide |c Ian Lim ; E. Coleen Coolidge ; Paul Hourani |
264 | 1 | |a Boca, Raton, FL |b CRC Press |c 2013 | |
300 | |a XVII, 210 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 7 | |a BUSINESS & ECONOMICS / Production & Operations Management |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Coolidge, E. Coleen |e Verfasser |4 aut | |
700 | 1 | |a Hourani, Paul |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025858852&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025858852 |
Datensatz im Suchindex
_version_ | 1804150161233936384 |
---|---|
adam_text | Contents
List of Figures
List of Tables
Xlii
XV
Part I Rethinking IT and Security
Chapter
1
Tectonic Shifts
1.1
Disruptive Forces
1.2
Deconstructing Cloud Computing
1.2.1
NIST Definition
1.2.2
The Three Service Models
1.2.3
The Four Deployment Models
1.3
The Rise of Mobility
1.4
New IT
References
Chapter
2
The
Evolving Threat Landscape
2.1
From Cryptographers to World Leaders
2.2
The Changing Threat Landscape
2.3
Hacktivists
2.3.1
Motivation
2.3.2
Modus
Operandi
2.3.3
Hacktivism and Cloud
2.3.4
Hacktivism and Mobility
2.3.5
Hacktivism and Security
2.4
Organized Cyber Crime
2.4.1
Motivation
2.4.2
Modus
Operandi
3
3
3
3
4
6
7
9
10
11
11
12
14
14
15
16
17
17
19
19
19
VII
VIII
CONTENTS
2.4.3
Organized Crime and Cloud
20
2.4.4
Organized Crime and Mobility
22
2.4.5
Organized Crime and Security
24
2.5
Cyber Espionage and Terrorism
25
2.5.1
Motivation
25
2.5.2
Modus
Operandi
26
2.5.3
Cyber Espionage, Terrorism, and Cloud
27
2.5.4
Cyber Espionage, Terrorism, and Mobility
27
2.5.5
Cyber Espionage, Terrorism, and Security
28
2.6
Hackers for Hire
29
2.6.1
Motivation and Modus
Operandi
29
2.6.2
Hackers for Hire and the Cloud
30
2.6.3
Hackers for Hire and Mobility
30
2.6.4
Hackers for Hire and Security
31
2.7
Insider Threat
32
References
33
Part
Deconstructing Cloud Security
Chapter
3
Cloud Dialogues
3.1
Point of Cloud
3.2
Capability
3.3
Financiais
3.4
Agility
3.5
Security
3.6
Licensing
3.7
Service Level Agreements
References
39
39
40
41
42
43
46
49
50
Part III Securing Private Cloud Computing
Chapter
4
Segmentation and the Private Cloud
53
4.1
Physical and Logical Segmentation
53
4.2
Physical Segmentation
54
4.3
Physical and Virtual Segmentation
56
4.4
Highly Optimized Segmentation Model
58
4.5
Production-Based Segmentation Model
60
4.6
Storage Segmentation Model
60
Chapter
5
Orchestration and Cloud Management
65
5.1
What Is Orchestration?
65
5.2
Benefits and Challenges
65
5.3
Information Security Considerations
68
5.3.1
Secure Service Delivery Workflows
69
5.3.2
Secure Resource Delivery Automation
69
5.3.3
Secure Orchestration Management
72
5.3.4
Security Monitoring
72
CONTENTS
IX
Chapter
6
Encryption Services
75
6.1
Holistic Encryption Strategy
75
6.2
Scope Reduction
76
6.3
Transport Layer Encryption
77
6.3.1
Secure Socket Layer (SSL)
77
6.3.2
Virtual Private Networks (VPNs)
77
6.3.3
Secure Shell (SSH)
78
6.3.4
Secure File Transfer Protocol (SFTP)
78
6.3.5
Transport Layer Security (TLS)
79
6.4
Data Layer Encryption
79
6.4.1
Database Encryption
80
6.4.2
File Encryption
80
6.4.3
Encryption Appliances
83
6.4.4
Disk Encryption
84
6.4.5
Virtualization Encryption
86
6.5
Key Management Life Cycle
88
References
91
Chapter
7
Threat Intelligence
93
7.1
Security Threats to Private Cloud
93
7.2
Threat Prevention Strategies
95
7.3
Threat Detection Toolset
95
7.4
Making Threat Detection Intelligent
99
Chapter
8
Identity Management for Private Clouds
103
8.1
Layers of Identities
103
8.2
Challenges of Disparate Identity Repositories
105
8.3
Centralizing Identity Repositories
106
8.3.1
Entitlements Aggregator
106
8.3.2
Authoritative Sources of Identities
108
8.3.3
Administrative Access
109
8.3.4
Task User Access
109
8.3.5
Central Identity Repository
110
Part IV Securing Public Clouds
Chapter
9
Enterprise Cloud Governance
9.1
Security Exposure of Public Cloud Use
9.2
Corporate Cloud Use Policy
9.3
Cloud Request Form
9.4
Cloud Approval Workflow
References
Chapter
10
Cursory Cloud Use Review
10.1
Overview
10.2
Interview with Cloud Service Provider
10.3
Cursory Review
—
Assessment Report
115
115
116
118
120
123
125
125
126
130
x
contents
Chapter
11
In-Depth Cloud Assessment
133
11.1
Overview
133
11.2
Interview with the Requestor
134
11.3
Security Governance
136
11.4
Data Protection
138
11.4.1
Overview
138
11.4.2
Data Protection Questions for All Service
Models
139
11.4.3
SaaS Data Protection Questions
139
11.4.4
PaaS Data Protection Questions
141
11.4.5
IaaS Data Protection Questions
142
11.5
Security Architecture
142
11.6
Application Security
144
11.6.1
Overview
144
11.6.2
SaaS Application Security
144
11.6.3
PaaS Application Security
145
11.7
Identity and Access Management
145
11.7.1
Overview
145
11.7.2
Identity Access Management for CSP Staff
146
11.7.3
Identity and Access Management for CSP
Customers
147
11.8
Compliance
149
11.9
Electronic Discovery
151
11.10
Closing the Loop
152
References
153
Chapter
12
Third-Party Cloud Assessment
155
12.1
Overview
155
12.2
Selecting an Assessor
156
12.3
Finalizing the SOW
156
12.4
Closing the Loop
158
Part V Securing Mobile
Chapter
13
Mobile Security Infrastructure
161
13.1
Overview
161
13.2
BlackBerry® Enterprise Server Architecture
161
13.3
Exchange to Support iOS, Android™, and Windows®
Phone
163
References
165
Chapter
14
The Mobile Client Itself
169
14.1
Overview
169
14.2
Tablet and Smart Phone Security Issues
169
14.3
Bring Your Own Device (BYOD)
170
14.4
Lack of Encryption
172
14.5
Lack of Good Authentication and Password Controls
173
CONTENTS
XI
14.6 Unfiltered Mobile Apps 174
14.7
Saying No Is a Tricky
Business 175
14.8
Updating Mobile Standards and Searching for
Solutions
175
14.9
Performing Sanity Testing
177
14.10
Garnering Executive Support and the Big Win
179
References
181
Chapter
15
Connecting to Enterprise and Third-
Party Applications from Mobile Devices
183
15.1
Overview
183
15.2
Connecting to Exchange
183
15.3
Connecting via VPN
184
15.4
Connecting to Microsoft SharePoint®
2010
or Later
186
15.5
Connecting to a Desktop or Server
187
15.6
Connecting to File Shares
189
15.7
Connecting to or Installing Third-Party Applications
190
References
191
Chapter
16
Creating Secure Mobile Applications
193
16.1
Mobile Application Development in Your
Organization
193
16.2
Start with the Stakeholders
194
16.3
Step through the Entire SDLC
196
16.4
Guidelines Regarding Enterprise App Store/
Google® Play
200
16.4.1
Overview of Infrastructure
200
16.4.2
Overview of Environment Setup and
General Controls
200
16.4.3
A Note about Publishing Your Apps
201
16.4.3.1
Dealing with the Apple® App
Store
201
16.4.3.2
Dealing with Android s Google
Play
201
References
201
Index
203
|
any_adam_object | 1 |
author | Lim, Ian Coolidge, E. Coleen Hourani, Paul |
author_facet | Lim, Ian Coolidge, E. Coleen Hourani, Paul |
author_role | aut aut aut |
author_sort | Lim, Ian |
author_variant | i l il e c c ec ecc p h ph |
building | Verbundindex |
bvnumber | BV040879051 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 |
callnumber-search | QA76.585 |
callnumber-sort | QA 276.585 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 300 |
ctrlnum | (OCoLC)840765227 (DE-599)BVBBV040879051 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02828nam a2200553zc 4500</leader><controlfield tag="001">BV040879051</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130701 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130313s2013 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012036919</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439850558</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-4398-5055-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)840765227</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040879051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.585</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lim, Ian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing cloud and mobility</subfield><subfield code="b">a practitioner's guide</subfield><subfield code="c">Ian Lim ; E. Coleen Coolidge ; Paul Hourani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca, Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 210 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Production & Operations Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Coolidge, E. Coleen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hourani, Paul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025858852&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025858852</subfield></datafield></record></collection> |
id | DE-604.BV040879051 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:34:31Z |
institution | BVB |
isbn | 9781439850558 |
language | English |
lccn | 2012036919 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025858852 |
oclc_num | 840765227 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-29T |
owner_facet | DE-473 DE-BY-UBG DE-29T |
physical | XVII, 210 S. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Lim, Ian Verfasser aut Securing cloud and mobility a practitioner's guide Ian Lim ; E. Coleen Coolidge ; Paul Hourani Boca, Raton, FL CRC Press 2013 XVII, 210 S. txt rdacontent n rdamedia nc rdacarrier "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- Provided by publisher. Includes bibliographical references and index Wirtschaft Cloud computing Security measures Mobile computing Security measures BUSINESS & ECONOMICS / Production & Operations Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Cloud Computing (DE-588)7623494-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s Datensicherung (DE-588)4011144-1 s DE-604 Mobile Computing (DE-588)4694120-4 s Coolidge, E. Coleen Verfasser aut Hourani, Paul Verfasser aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025858852&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lim, Ian Coolidge, E. Coleen Hourani, Paul Securing cloud and mobility a practitioner's guide Wirtschaft Cloud computing Security measures Mobile computing Security measures BUSINESS & ECONOMICS / Production & Operations Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd Mobile Computing (DE-588)4694120-4 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4011144-1 (DE-588)4694120-4 |
title | Securing cloud and mobility a practitioner's guide |
title_auth | Securing cloud and mobility a practitioner's guide |
title_exact_search | Securing cloud and mobility a practitioner's guide |
title_full | Securing cloud and mobility a practitioner's guide Ian Lim ; E. Coleen Coolidge ; Paul Hourani |
title_fullStr | Securing cloud and mobility a practitioner's guide Ian Lim ; E. Coleen Coolidge ; Paul Hourani |
title_full_unstemmed | Securing cloud and mobility a practitioner's guide Ian Lim ; E. Coleen Coolidge ; Paul Hourani |
title_short | Securing cloud and mobility |
title_sort | securing cloud and mobility a practitioner s guide |
title_sub | a practitioner's guide |
topic | Wirtschaft Cloud computing Security measures Mobile computing Security measures BUSINESS & ECONOMICS / Production & Operations Management bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd Mobile Computing (DE-588)4694120-4 gnd |
topic_facet | Wirtschaft Cloud computing Security measures Mobile computing Security measures BUSINESS & ECONOMICS / Production & Operations Management COMPUTERS / Information Technology COMPUTERS / Security / General Cloud Computing Datensicherung Mobile Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025858852&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT limian securingcloudandmobilityapractitionersguide AT coolidgeecoleen securingcloudandmobilityapractitionersguide AT houranipaul securingcloudandmobilityapractitionersguide |