Securing cloud services: a pragmatic approach to security architecture in the cloud
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, U.K.
IT Governance Pub.
2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen Includes bibliographical references This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead |
Beschreibung: | 1 Online-Ressource |
ISBN: | 162870019X 1849283966 1849283974 1849283982 9781628700190 9781849283960 9781849283977 9781849283984 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043101820 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 162870019X |c electronic bk. |9 1-62870-019-X | ||
020 | |a 1849283966 |9 1-84928-396-6 | ||
020 | |a 1849283974 |c electronic bk. |9 1-84928-397-4 | ||
020 | |a 1849283982 |9 1-84928-398-2 | ||
020 | |a 9781628700190 |c electronic bk. |9 978-1-62870-019-0 | ||
020 | |a 9781849283960 |9 978-1-84928-396-0 | ||
020 | |a 9781849283977 |c electronic bk. |9 978-1-84928-397-7 | ||
020 | |a 9781849283984 |9 978-1-84928-398-4 | ||
035 | |a (OCoLC)833573779 | ||
035 | |a (DE-599)BVBBV043101820 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Newcombe, Lee |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing cloud services |b a pragmatic approach to security architecture in the cloud |c Lee Newcombe |
264 | 1 | |a Ely, Cambridgeshire, U.K. |b IT Governance Pub. |c 2012 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen | ||
500 | |a Includes bibliographical references | ||
500 | |a This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud | ||
500 | |a Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Cloud computing / Security measures |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Web services / Security measures |2 local | |
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Web services |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028526012 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175512585633792 |
---|---|
any_adam_object | |
author | Newcombe, Lee |
author_facet | Newcombe, Lee |
author_role | aut |
author_sort | Newcombe, Lee |
author_variant | l n ln |
building | Verbundindex |
bvnumber | BV043101820 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)833573779 (DE-599)BVBBV043101820 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02969nmm a2200565zc 4500</leader><controlfield tag="001">BV043101820</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">162870019X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-62870-019-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283966</subfield><subfield code="9">1-84928-396-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283974</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-397-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283982</subfield><subfield code="9">1-84928-398-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781628700190</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-62870-019-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283960</subfield><subfield code="9">978-1-84928-396-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283977</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-397-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283984</subfield><subfield code="9">978-1-84928-398-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)833573779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043101820</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Newcombe, Lee</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing cloud services</subfield><subfield code="b">a pragmatic approach to security architecture in the cloud</subfield><subfield code="c">Lee Newcombe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web services / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028526012</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043101820 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:28Z |
institution | BVB |
isbn | 162870019X 1849283966 1849283974 1849283982 9781628700190 9781849283960 9781849283977 9781849283984 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028526012 |
oclc_num | 833573779 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Newcombe, Lee Verfasser aut Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe Ely, Cambridgeshire, U.K. IT Governance Pub. 2012 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Title from title screen Includes bibliographical references This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing / Security measures local Computer security local Web services / Security measures local COMPUTERS / General bisacsh Cloud computing Security measures Computer security Web services Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569 Aggregator Volltext |
spellingShingle | Newcombe, Lee Securing cloud services a pragmatic approach to security architecture in the cloud COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing / Security measures local Computer security local Web services / Security measures local COMPUTERS / General bisacsh Cloud computing Security measures Computer security Web services Security measures |
title | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_auth | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_exact_search | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_full | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_fullStr | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_full_unstemmed | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_short | Securing cloud services |
title_sort | securing cloud services a pragmatic approach to security architecture in the cloud |
title_sub | a pragmatic approach to security architecture in the cloud |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cloud computing / Security measures local Computer security local Web services / Security measures local COMPUTERS / General bisacsh Cloud computing Security measures Computer security Web services Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Cloud computing / Security measures Computer security Web services / Security measures COMPUTERS / General Cloud computing Security measures Web services Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=571569 |
work_keys_str_mv | AT newcombelee securingcloudservicesapragmaticapproachtosecurityarchitectureinthecloud |