Securing the cloud: cloud computer security techniques and tactics
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier
2011
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 FUBA1 Volltext |
Beschreibung: | As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (XXIV, 290 S.) graph. Darst. |
ISBN: | 9781597495929 1597495921 9781597495936 159749593X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314270 | ||
003 | DE-604 | ||
005 | 20210510 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597495929 |c electronic bk. |9 978-1-59749-592-9 | ||
020 | |a 1597495921 |c electronic bk. |9 1-59749-592-1 | ||
020 | |a 9781597495936 |c electronic bk. |9 978-1-59749-593-6 | ||
020 | |a 159749593X |c electronic bk. |9 1-59749-593-X | ||
024 | 7 | |a 10.1016/C2009-0-30544-9 |2 doi | |
035 | |a (ZDB-4-EBA)ocn722800241 | ||
035 | |a (ZDB-4-ITC)ocn722800241 | ||
035 | |a (OCoLC)722800241 | ||
035 | |a (DE-599)BVBBV042314270 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Winkler, Vic |e Verfasser |0 (DE-588)1013266331 |4 aut | |
245 | 1 | 0 | |a Securing the cloud |b cloud computer security techniques and tactics |c Vic (J.R.) Winkler |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier |c 2011 | |
300 | |a 1 Online-Ressource (XXIV, 290 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59749-592-9 |w (DE-604)BV036959984 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495929 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-4-EBA |a ZDB-33-EBS |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027751261 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495929 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597495929 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597495929 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2013 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907242668032 |
---|---|
any_adam_object | |
author | Winkler, Vic |
author_GND | (DE-588)1013266331 |
author_facet | Winkler, Vic |
author_role | aut |
author_sort | Winkler, Vic |
author_variant | v w vw |
building | Verbundindex |
bvnumber | BV042314270 |
collection | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn722800241 (ZDB-4-ITC)ocn722800241 (OCoLC)722800241 (DE-599)BVBBV042314270 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03713nmm a2200601zc 4500</leader><controlfield tag="001">BV042314270</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210510 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495929</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-592-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495921</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-592-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495936</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-593-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749593X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-593-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2009-0-30544-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn722800241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn722800241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)722800241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314270</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, Vic</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1013266331</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the cloud</subfield><subfield code="b">cloud computer security techniques and tactics</subfield><subfield code="c">Vic (J.R.) Winkler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 290 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59749-592-9</subfield><subfield code="w">(DE-604)BV036959984</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751261</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495929</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2013</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314270 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597495929 1597495921 9781597495936 159749593X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751261 |
oclc_num | 722800241 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (XXIV, 290 S.) graph. Darst. |
psigel | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2013 |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier |
record_format | marc |
spelling | Winkler, Vic Verfasser (DE-588)1013266331 aut Securing the cloud cloud computer security techniques and tactics Vic (J.R.) Winkler Amsterdam [u.a.] Elsevier 2011 1 Online-Ressource (XXIV, 290 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power and storage Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing fast Computer networks / Security measures fast Computer security fast Cloud computing Computer security Computer networks Security measures Cloud Computing (DE-588)7623494-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe, Paperback 978-1-59749-592-9 (DE-604)BV036959984 http://www.sciencedirect.com/science/book/9781597495929 Verlag Volltext |
spellingShingle | Winkler, Vic Securing the cloud cloud computer security techniques and tactics COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing fast Computer networks / Security measures fast Computer security fast Cloud computing Computer security Computer networks Security measures Cloud Computing (DE-588)7623494-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4274324-2 |
title | Securing the cloud cloud computer security techniques and tactics |
title_auth | Securing the cloud cloud computer security techniques and tactics |
title_exact_search | Securing the cloud cloud computer security techniques and tactics |
title_full | Securing the cloud cloud computer security techniques and tactics Vic (J.R.) Winkler |
title_fullStr | Securing the cloud cloud computer security techniques and tactics Vic (J.R.) Winkler |
title_full_unstemmed | Securing the cloud cloud computer security techniques and tactics Vic (J.R.) Winkler |
title_short | Securing the cloud |
title_sort | securing the cloud cloud computer security techniques and tactics |
title_sub | cloud computer security techniques and tactics |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing fast Computer networks / Security measures fast Computer security fast Cloud computing Computer security Computer networks Security measures Cloud Computing (DE-588)7623494-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Cloud computing Computer networks / Security measures Computer security Computer networks Security measures Cloud Computing Computersicherheit |
url | http://www.sciencedirect.com/science/book/9781597495929 |
work_keys_str_mv | AT winklervic securingthecloudcloudcomputersecuritytechniquesandtactics |