Securing cloud services: a pragmatic approach to security architecture in the cloud
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, U.K.
IT Governance Pub.
2012
|
Schlagworte: | |
Beschreibung: | 1 online resource |
ISBN: | 9781849283977 1849283974 9781628700190 162870019X 9781849283984 1849283982 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349975 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849283977 |9 978-1-84928-397-7 | ||
020 | |a 1849283974 |9 1-84928-397-4 | ||
020 | |a 9781628700190 |9 978-1-62870-019-0 | ||
020 | |a 162870019X |9 1-62870-019-X | ||
020 | |a 9781849283984 |9 978-1-84928-398-4 | ||
020 | |a 1849283982 |9 1-84928-398-2 | ||
035 | |a (ZDB-4-ITC)ocn833573779 | ||
035 | |a (OCoLC)833573779 | ||
035 | |a (DE-599)BVBBV045349975 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Newcombe, Lee |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing cloud services |b a pragmatic approach to security architecture in the cloud |c Lee Newcombe |
264 | 1 | |a Ely, Cambridgeshire, U.K. |b IT Governance Pub. |c 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Cloud computing |x Security measures |a Computer security |a Web services |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Newcombe, Lee |t Securing cloud services |d Ely, Cambridgeshire : IT Governance, 2012 |z 9781849283960 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736629 |
Datensatz im Suchindex
_version_ | 1804179174278037504 |
---|---|
any_adam_object | |
author | Newcombe, Lee |
author_facet | Newcombe, Lee |
author_role | aut |
author_sort | Newcombe, Lee |
author_variant | l n ln |
building | Verbundindex |
bvnumber | BV045349975 |
collection | ZDB-4-ITC |
contents | This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud |
ctrlnum | (ZDB-4-ITC)ocn833573779 (OCoLC)833573779 (DE-599)BVBBV045349975 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01805nmm a2200433zc 4500</leader><controlfield tag="001">BV045349975</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283977</subfield><subfield code="9">978-1-84928-397-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283974</subfield><subfield code="9">1-84928-397-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781628700190</subfield><subfield code="9">978-1-62870-019-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">162870019X</subfield><subfield code="9">1-62870-019-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849283984</subfield><subfield code="9">978-1-84928-398-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849283982</subfield><subfield code="9">1-84928-398-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn833573779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)833573779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349975</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Newcombe, Lee</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing cloud services</subfield><subfield code="b">a pragmatic approach to security architecture in the cloud</subfield><subfield code="c">Lee Newcombe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield><subfield code="a">Web services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Newcombe, Lee</subfield><subfield code="t">Securing cloud services</subfield><subfield code="d">Ely, Cambridgeshire : IT Governance, 2012</subfield><subfield code="z">9781849283960</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736629</subfield></datafield></record></collection> |
id | DE-604.BV045349975 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849283977 1849283974 9781628700190 162870019X 9781849283984 1849283982 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736629 |
oclc_num | 833573779 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Newcombe, Lee Verfasser aut Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe Ely, Cambridgeshire, U.K. IT Governance Pub. 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / General bisacsh Computer security fast Cloud computing Security measures Computer security Web services Security measures Erscheint auch als Druck-Ausgabe Newcombe, Lee Securing cloud services Ely, Cambridgeshire : IT Governance, 2012 9781849283960 |
spellingShingle | Newcombe, Lee Securing cloud services a pragmatic approach to security architecture in the cloud This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / General bisacsh Computer security fast Cloud computing Security measures Computer security Web services Security measures |
title | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_auth | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_exact_search | Securing cloud services a pragmatic approach to security architecture in the cloud |
title_full | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_fullStr | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_full_unstemmed | Securing cloud services a pragmatic approach to security architecture in the cloud Lee Newcombe |
title_short | Securing cloud services |
title_sort | securing cloud services a pragmatic approach to security architecture in the cloud |
title_sub | a pragmatic approach to security architecture in the cloud |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh COMPUTERS / General bisacsh Computer security fast Cloud computing Security measures Computer security Web services Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General COMPUTERS / General Computer security Cloud computing Security measures Computer security Web services Security measures |
work_keys_str_mv | AT newcombelee securingcloudservicesapragmaticapproachtosecurityarchitectureinthecloud |