Cloud Security and Governance: Who's on your cloud?
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2010
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (58 pages) |
ISBN: | 9781849280914 1849280916 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349071 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781849280914 |9 978-1-84928-091-4 | ||
020 | |a 1849280916 |9 1-84928-091-6 | ||
035 | |a (ZDB-4-ITC)ocn700706557 | ||
035 | |a (OCoLC)700706557 | ||
035 | |a (DE-599)BVBBV045349071 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Blount, Sumner |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cloud Security and Governance |b Who's on your cloud? |
264 | 1 | |a Ely |b IT Governance Pub. |c 2010 | |
300 | |a 1 online resource (58 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Cloud computing |x Security measures |a Computer security | |
700 | 1 | |a Zanella, Rob |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Blount, Sumner |t Cloud Security and Governance : Who's on your cloud? |d Ely : IT Governance Publishing, 2010 |z 9781849280907 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735723 |
Datensatz im Suchindex
_version_ | 1804179172673716224 |
---|---|
any_adam_object | |
author | Blount, Sumner |
author_facet | Blount, Sumner |
author_role | aut |
author_sort | Blount, Sumner |
author_variant | s b sb |
building | Verbundindex |
bvnumber | BV045349071 |
collection | ZDB-4-ITC |
contents | This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed |
ctrlnum | (ZDB-4-ITC)ocn700706557 (OCoLC)700706557 (DE-599)BVBBV045349071 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01561nmm a2200397zc 4500</leader><controlfield tag="001">BV045349071</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280914</subfield><subfield code="9">978-1-84928-091-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280916</subfield><subfield code="9">1-84928-091-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn700706557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700706557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349071</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Blount, Sumner</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Security and Governance</subfield><subfield code="b">Who's on your cloud?</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (58 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zanella, Rob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Blount, Sumner</subfield><subfield code="t">Cloud Security and Governance : Who's on your cloud?</subfield><subfield code="d">Ely : IT Governance Publishing, 2010</subfield><subfield code="z">9781849280907</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735723</subfield></datafield></record></collection> |
id | DE-604.BV045349071 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781849280914 1849280916 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735723 |
oclc_num | 700706557 |
open_access_boolean | |
physical | 1 online resource (58 pages) |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Blount, Sumner Verfasser aut Cloud Security and Governance Who's on your cloud? Ely IT Governance Pub. 2010 1 online resource (58 pages) txt rdacontent c rdamedia cr rdacarrier Print version record This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cloud computing Security measures Computer security Zanella, Rob Sonstige oth Erscheint auch als Druck-Ausgabe Blount, Sumner Cloud Security and Governance : Who's on your cloud? Ely : IT Governance Publishing, 2010 9781849280907 |
spellingShingle | Blount, Sumner Cloud Security and Governance Who's on your cloud? This pocket guide explains and highlights some of the key security and compliance issues surrounding Cloud adoption, and provides helpful insight into how they can be addressed COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cloud computing Security measures Computer security |
title | Cloud Security and Governance Who's on your cloud? |
title_auth | Cloud Security and Governance Who's on your cloud? |
title_exact_search | Cloud Security and Governance Who's on your cloud? |
title_full | Cloud Security and Governance Who's on your cloud? |
title_fullStr | Cloud Security and Governance Who's on your cloud? |
title_full_unstemmed | Cloud Security and Governance Who's on your cloud? |
title_short | Cloud Security and Governance |
title_sort | cloud security and governance who s on your cloud |
title_sub | Who's on your cloud? |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cloud computing Security measures Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Cloud computing Security measures Computer security |
work_keys_str_mv | AT blountsumner cloudsecurityandgovernancewhosonyourcloud AT zanellarob cloudsecurityandgovernancewhosonyourcloud |