Elements of cloud computing security: a survey of key practicalities
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Schriftenreihe: | SpringerBriefs in computer science
|
Schlagworte: | |
Online-Zugang: | BTW01 BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XI, 55 Seiten, 7 illus) |
ISBN: | 9783319414119 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-3-319-41411-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043706398 | ||
003 | DE-604 | ||
005 | 20161121 | ||
007 | cr|uuu---uuuuu | ||
008 | 160809s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319414119 |c Online |9 978-3-319-41411-9 | ||
024 | 7 | |a 10.1007/978-3-319-41411-9 |2 doi | |
035 | |a (ZDB-2-SCS)9783319414119 | ||
035 | |a (OCoLC)954995964 | ||
035 | |a (DE-599)BVBBV043706398 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-526 | ||
082 | 0 | |a 004.6 |2 23 | |
100 | 1 | |a Alani, Mohammed M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Elements of cloud computing security |b a survey of key practicalities |c Mohammed M. Alani |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (XI, 55 Seiten, 7 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in computer science |x 2191-5768 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Data Storage Representation | |
650 | 4 | |a Informatik | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-41410-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-41411-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-30-PQE | ||
940 | 1 | |q BTW_PDA_PQE-KAUF | |
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029118711 | ||
966 | e | |u http://ebookcentral.proquest.com/lib/th-wildau/detail.action?docID=4592504 |l BTW01 |p ZDB-30-PQE |q BTW_PDA_PQE_KAUF |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41411-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176491990220800 |
---|---|
any_adam_object | |
author | Alani, Mohammed M. |
author_facet | Alani, Mohammed M. |
author_role | aut |
author_sort | Alani, Mohammed M. |
author_variant | m m a mm mma |
building | Verbundindex |
bvnumber | BV043706398 |
collection | ZDB-2-SCS ZDB-30-PQE |
ctrlnum | (ZDB-2-SCS)9783319414119 (OCoLC)954995964 (DE-599)BVBBV043706398 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-41411-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03483nmm a2200709zc 4500</leader><controlfield tag="001">BV043706398</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161121 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160809s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319414119</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-41411-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-41411-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319414119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)954995964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043706398</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-526</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alani, Mohammed M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Elements of cloud computing security</subfield><subfield code="b">a survey of key practicalities</subfield><subfield code="c">Mohammed M. Alani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 55 Seiten, 7 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in computer science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Storage Representation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-41410-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BTW_PDA_PQE-KAUF</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029118711</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://ebookcentral.proquest.com/lib/th-wildau/detail.action?docID=4592504</subfield><subfield code="l">BTW01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">BTW_PDA_PQE_KAUF</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41411-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043706398 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:02Z |
institution | BVB |
isbn | 9783319414119 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029118711 |
oclc_num | 954995964 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-526 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-526 |
physical | 1 Online-Ressource (XI, 55 Seiten, 7 illus) |
psigel | ZDB-2-SCS ZDB-30-PQE BTW_PDA_PQE-KAUF ZDB-2-SCS_2016 ZDB-30-PQE BTW_PDA_PQE_KAUF |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in computer science |
spelling | Alani, Mohammed M. Verfasser aut Elements of cloud computing security a survey of key practicalities Mohammed M. Alani [Cham] Springer [2016] © 2016 1 Online-Ressource (XI, 55 Seiten, 7 illus) txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in computer science 2191-5768 Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Data Encryption Data Storage Representation Informatik Erscheint auch als Druckausgabe 978-3-319-41410-2 https://doi.org/10.1007/978-3-319-41411-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Alani, Mohammed M. Elements of cloud computing security a survey of key practicalities Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Data Encryption Data Storage Representation Informatik |
title | Elements of cloud computing security a survey of key practicalities |
title_auth | Elements of cloud computing security a survey of key practicalities |
title_exact_search | Elements of cloud computing security a survey of key practicalities |
title_full | Elements of cloud computing security a survey of key practicalities Mohammed M. Alani |
title_fullStr | Elements of cloud computing security a survey of key practicalities Mohammed M. Alani |
title_full_unstemmed | Elements of cloud computing security a survey of key practicalities Mohammed M. Alani |
title_short | Elements of cloud computing security |
title_sort | elements of cloud computing security a survey of key practicalities |
title_sub | a survey of key practicalities |
topic | Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Data Encryption Data Storage Representation Informatik |
topic_facet | Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Computer Communication Networks Systems and Data Security Data Encryption Data Storage Representation Informatik |
url | https://doi.org/10.1007/978-3-319-41411-9 |
work_keys_str_mv | AT alanimohammedm elementsofcloudcomputingsecurityasurveyofkeypracticalities |