Securing cloud and mobility: a practitioner's guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca, Raton, Fla.
Taylor & Francis
2013
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- |
Beschreibung: | 1 Online-Ressource (xvii, 201 p.) |
ISBN: | 9781439850558 9781439850572 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041069588 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130605s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781439850558 |9 978-1-4398-5055-8 | ||
020 | |a 9781439850572 |9 978-1-4398-5057-2 | ||
035 | |a (OCoLC)828743788 | ||
035 | |a (DE-599)BVBBV041069588 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Lim, Ian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing cloud and mobility |b a practitioner's guide |c Ian Lim, Paul Hourani, E. Coleen Coolidge |
264 | 1 | |a Boca, Raton, Fla. |b Taylor & Francis |c 2013 | |
300 | |a 1 Online-Ressource (xvii, 201 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- | ||
505 | 0 | |a pt. I. Rethinking IT and security -- pt. II. Deconstructing cloud security -- pt. III. Securing private cloud computing -- pt. IV. Securing public clouds -- pt. V. Securing mobile | |
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Mobile computing / Security measures | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Hourani, Paul |e Sonstige |4 oth | |
700 | 1 | |a Coolidge, E. Coleen |e Sonstige |4 oth | |
912 | |a ZDB-38-EBR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026046543 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804150437009424384 |
---|---|
any_adam_object | |
author | Lim, Ian |
author_facet | Lim, Ian |
author_role | aut |
author_sort | Lim, Ian |
author_variant | i l il |
building | Verbundindex |
bvnumber | BV041069588 |
collection | ZDB-38-EBR |
contents | pt. I. Rethinking IT and security -- pt. II. Deconstructing cloud security -- pt. III. Securing private cloud computing -- pt. IV. Securing public clouds -- pt. V. Securing mobile |
ctrlnum | (OCoLC)828743788 (DE-599)BVBBV041069588 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02653nmm a2200493zc 4500</leader><controlfield tag="001">BV041069588</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130605s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439850558</subfield><subfield code="9">978-1-4398-5055-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439850572</subfield><subfield code="9">978-1-4398-5057-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828743788</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041069588</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lim, Ian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing cloud and mobility</subfield><subfield code="b">a practitioner's guide</subfield><subfield code="c">Ian Lim, Paul Hourani, E. Coleen Coolidge</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca, Raton, Fla.</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 201 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. I. Rethinking IT and security -- pt. II. Deconstructing cloud security -- pt. III. Securing private cloud computing -- pt. IV. Securing public clouds -- pt. V. Securing mobile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hourani, Paul</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Coolidge, E. Coleen</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026046543</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV041069588 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:38:54Z |
institution | BVB |
isbn | 9781439850558 9781439850572 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026046543 |
oclc_num | 828743788 |
open_access_boolean | |
physical | 1 Online-Ressource (xvii, 201 p.) |
psigel | ZDB-38-EBR |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Taylor & Francis |
record_format | marc |
spelling | Lim, Ian Verfasser aut Securing cloud and mobility a practitioner's guide Ian Lim, Paul Hourani, E. Coleen Coolidge Boca, Raton, Fla. Taylor & Francis 2013 1 Online-Ressource (xvii, 201 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"-- pt. I. Rethinking IT and security -- pt. II. Deconstructing cloud security -- pt. III. Securing private cloud computing -- pt. IV. Securing public clouds -- pt. V. Securing mobile Cloud computing / Security measures Mobile computing / Security measures Cloud Computing (DE-588)7623494-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf Mobile Computing (DE-588)4694120-4 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Cloud Computing (DE-588)7623494-0 s 2\p DE-604 Hourani, Paul Sonstige oth Coolidge, E. Coleen Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lim, Ian Securing cloud and mobility a practitioner's guide pt. I. Rethinking IT and security -- pt. II. Deconstructing cloud security -- pt. III. Securing private cloud computing -- pt. IV. Securing public clouds -- pt. V. Securing mobile Cloud computing / Security measures Mobile computing / Security measures Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd Mobile Computing (DE-588)4694120-4 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4011144-1 (DE-588)4694120-4 |
title | Securing cloud and mobility a practitioner's guide |
title_auth | Securing cloud and mobility a practitioner's guide |
title_exact_search | Securing cloud and mobility a practitioner's guide |
title_full | Securing cloud and mobility a practitioner's guide Ian Lim, Paul Hourani, E. Coleen Coolidge |
title_fullStr | Securing cloud and mobility a practitioner's guide Ian Lim, Paul Hourani, E. Coleen Coolidge |
title_full_unstemmed | Securing cloud and mobility a practitioner's guide Ian Lim, Paul Hourani, E. Coleen Coolidge |
title_short | Securing cloud and mobility |
title_sort | securing cloud and mobility a practitioner s guide |
title_sub | a practitioner's guide |
topic | Cloud computing / Security measures Mobile computing / Security measures Cloud Computing (DE-588)7623494-0 gnd Datensicherung (DE-588)4011144-1 gnd Mobile Computing (DE-588)4694120-4 gnd |
topic_facet | Cloud computing / Security measures Mobile computing / Security measures Cloud Computing Datensicherung Mobile Computing |
work_keys_str_mv | AT limian securingcloudandmobilityapractitionersguide AT houranipaul securingcloudandmobilityapractitionersguide AT coolidgeecoleen securingcloudandmobilityapractitionersguide |