Cloud Security and Governance: Who's on your cloud?
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (58 pages) |
ISBN: | 1849280908 1849280916 9781849280907 9781849280914 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043039455 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2010 |||| o||u| ||||||eng d | ||
020 | |a 1849280908 |9 1-84928-090-8 | ||
020 | |a 1849280916 |c electronic bk. |9 1-84928-091-6 | ||
020 | |a 9781849280907 |9 978-1-84928-090-7 | ||
020 | |a 9781849280914 |c electronic bk. |9 978-1-84928-091-4 | ||
035 | |a (OCoLC)700706557 | ||
035 | |a (DE-599)BVBBV043039455 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Blount, Sumner |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cloud Security and Governance |b Who's on your cloud? |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 online resource (58 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES. | |
505 | 8 | |a This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Cloud computing / Security measures | |
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Informatik | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Zanella, Rob |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Blount, Sumner |t Cloud Security and Governance : Who's on your cloud? |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028464102 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175402198892544 |
---|---|
any_adam_object | |
author | Blount, Sumner |
author_facet | Blount, Sumner |
author_role | aut |
author_sort | Blount, Sumner |
author_variant | s b sb |
building | Verbundindex |
bvnumber | BV043039455 |
collection | ZDB-4-EBA |
contents | FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES. This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed |
ctrlnum | (OCoLC)700706557 (DE-599)BVBBV043039455 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02616nmm a2200529zc 4500</leader><controlfield tag="001">BV043039455</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280908</subfield><subfield code="9">1-84928-090-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280916</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-091-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280907</subfield><subfield code="9">978-1-84928-090-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280914</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-091-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700706557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043039455</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blount, Sumner</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Security and Governance</subfield><subfield code="b">Who's on your cloud?</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (58 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zanella, Rob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Blount, Sumner</subfield><subfield code="t">Cloud Security and Governance : Who's on your cloud?</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028464102</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043039455 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:43Z |
institution | BVB |
isbn | 1849280908 1849280916 9781849280907 9781849280914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028464102 |
oclc_num | 700706557 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (58 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Blount, Sumner Verfasser aut Cloud Security and Governance Who's on your cloud? Ely IT Governance Pub. 2010 1 online resource (58 pages) txt rdacontent c rdamedia cr rdacarrier Print version record FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES. This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed Computer networks / Security measures Computer science Cloud computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Informatik Cloud computing Security measures Zanella, Rob Sonstige oth Erscheint auch als Druck-Ausgabe Blount, Sumner Cloud Security and Governance : Who's on your cloud? http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120 Aggregator Volltext |
spellingShingle | Blount, Sumner Cloud Security and Governance Who's on your cloud? FOREWORD; PREFACE; ABOUT THE AUTHORS; ACKNOWLEDGEMENTS; CONTENTS; INTRODUCTION; CHAPTER 1: CLOUD COMPUTING -- A REFRESHER; CHAPTER 2: CLOUD SECURITY AND COMPLIANCE -- SETTING THE STAGE; CHAPTER 3: SECURITY AND PRIVACY IN THE CLOUD; CHAPTER 4: COMPLIANCE IN THE CLOUD; CHAPTER 5: RECOMMENDATIONS FOR EFFECTIVE CLOUD SECURITY AND COMPLIANCE; ITG RESOURCES. This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed Computer networks / Security measures Computer science Cloud computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Informatik Cloud computing Security measures |
title | Cloud Security and Governance Who's on your cloud? |
title_auth | Cloud Security and Governance Who's on your cloud? |
title_exact_search | Cloud Security and Governance Who's on your cloud? |
title_full | Cloud Security and Governance Who's on your cloud? |
title_fullStr | Cloud Security and Governance Who's on your cloud? |
title_full_unstemmed | Cloud Security and Governance Who's on your cloud? |
title_short | Cloud Security and Governance |
title_sort | cloud security and governance who s on your cloud |
title_sub | Who's on your cloud? |
topic | Computer networks / Security measures Computer science Cloud computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Informatik Cloud computing Security measures |
topic_facet | Computer networks / Security measures Computer science Cloud computing / Security measures Computer security COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Informatik Cloud computing Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391120 |
work_keys_str_mv | AT blountsumner cloudsecurityandgovernancewhosonyourcloud AT zanellarob cloudsecurityandgovernancewhosonyourcloud |