Cloud Computing: Assessing the Risks
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Publishing
2012
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Intrusion detection system/intrusion prevention system What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing |
Beschreibung: | 1 Online-Ressource (297 pages) |
ISBN: | 9781849283601 1849283605 9781628700114 1628700114 1849283591 9781849283595 9781849283618 1849283613 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042961220 | ||
003 | DE-604 | ||
005 | 20161208 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849283601 |c electronic bk. |9 978-1-84928-360-1 | ||
020 | |a 1849283605 |c electronic bk. |9 1-84928-360-5 | ||
020 | |a 9781628700114 |c electronic bk. |9 978-1-62870-011-4 | ||
020 | |a 1628700114 |c electronic bk. |9 1-62870-011-4 | ||
020 | |a 1849283591 |9 1-84928-359-1 | ||
020 | |a 9781849283595 |9 978-1-84928-359-5 | ||
020 | |a 9781849283618 |9 978-1-84928-361-8 | ||
020 | |a 1849283613 |9 1-84928-361-3 | ||
035 | |a (OCoLC)799769042 | ||
035 | |a (DE-599)BVBBV042961220 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 |a DE-706 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Carstensen, Jared |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cloud Computing |b Assessing the Risks |
264 | 1 | |a Ely |b IT Governance Publishing |c 2012 | |
300 | |a 1 Online-Ressource (297 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Intrusion detection system/intrusion prevention system | ||
500 | |a What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three | ||
500 | |a Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism | ||
500 | |a The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility | ||
500 | |a Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work | ||
500 | |a Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing | ||
500 | |a Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing | ||
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Cloud computing | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Web / General |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Web services |2 fast | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Web services | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Morgenthal, JP. |e Sonstige |4 oth | |
700 | 1 | |a Golden, Bernard |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571554 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-EBU | ||
940 | 1 | |q FAW_PDA_EBA | |
940 | 1 | |q FLA_PDA_EBU | |
940 | 1 | |q UBY_PDA_EBA_Kauf | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028387088 |
Datensatz im Suchindex
_version_ | 1804175282714705920 |
---|---|
any_adam_object | |
author | Carstensen, Jared |
author_facet | Carstensen, Jared |
author_role | aut |
author_sort | Carstensen, Jared |
author_variant | j c jc |
building | Verbundindex |
bvnumber | BV042961220 |
collection | ZDB-4-EBA ZDB-4-EBU |
ctrlnum | (OCoLC)799769042 (DE-599)BVBBV042961220 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05458nmm a2200697zc 4500</leader><controlfield tag="001">BV042961220</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161208 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283601</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-360-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-360-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781628700114</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-62870-011-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1628700114</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-62870-011-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283591</subfield><subfield code="9">1-84928-359-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283595</subfield><subfield code="9">978-1-84928-359-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283618</subfield><subfield code="9">978-1-84928-361-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283613</subfield><subfield code="9">1-84928-361-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)799769042</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042961220</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carstensen, Jared</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="b">Assessing the Risks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (297 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Intrusion detection system/intrusion prevention system</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morgenthal, JP.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Golden, Bernard</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571554</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBY_PDA_EBA_Kauf</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028387088</subfield></datafield></record></collection> |
id | DE-604.BV042961220 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:49Z |
institution | BVB |
isbn | 9781849283601 1849283605 9781628700114 1628700114 1849283591 9781849283595 9781849283618 1849283613 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028387088 |
oclc_num | 799769042 |
open_access_boolean | |
owner | DE-1046 DE-1047 DE-706 |
owner_facet | DE-1046 DE-1047 DE-706 |
physical | 1 Online-Ressource (297 pages) |
psigel | ZDB-4-EBA ZDB-4-EBU FAW_PDA_EBA FLA_PDA_EBU UBY_PDA_EBA_Kauf |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Carstensen, Jared Verfasser aut Cloud Computing Assessing the Risks Ely IT Governance Publishing 2012 1 Online-Ressource (297 pages) txt rdacontent c rdamedia cr rdacarrier Intrusion detection system/intrusion prevention system What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing Cloud computing / Security measures Data protection Information technology / Security measures Cloud computing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Web / General bisacsh Cloud computing fast Web services fast Web services Cloud Computing (DE-588)7623494-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s DE-604 Morgenthal, JP. Sonstige oth Golden, Bernard Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571554 Aggregator Volltext |
spellingShingle | Carstensen, Jared Cloud Computing Assessing the Risks Cloud computing / Security measures Data protection Information technology / Security measures Cloud computing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Web / General bisacsh Cloud computing fast Web services fast Web services Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)7623494-0 |
title | Cloud Computing Assessing the Risks |
title_auth | Cloud Computing Assessing the Risks |
title_exact_search | Cloud Computing Assessing the Risks |
title_full | Cloud Computing Assessing the Risks |
title_fullStr | Cloud Computing Assessing the Risks |
title_full_unstemmed | Cloud Computing Assessing the Risks |
title_short | Cloud Computing |
title_sort | cloud computing assessing the risks |
title_sub | Assessing the Risks |
topic | Cloud computing / Security measures Data protection Information technology / Security measures Cloud computing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / Web / General bisacsh Cloud computing fast Web services fast Web services Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Cloud computing / Security measures Data protection Information technology / Security measures Cloud computing COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General COMPUTERS / Web / General Web services Cloud Computing |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571554 |
work_keys_str_mv | AT carstensenjared cloudcomputingassessingtherisks AT morgenthaljp cloudcomputingassessingtherisks AT goldenbernard cloudcomputingassessingtherisks |