Public cloud computing: security and privacy guidelines
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hauppauge, N.Y.
Nova Science Publisher's
2012
|
Schlagworte: | |
Beschreibung: | 1 online resource |
ISBN: | 9781622570461 1622570464 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045351639 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781622570461 |9 978-1-62257-046-1 | ||
020 | |a 1622570464 |9 1-62257-046-4 | ||
035 | |a (ZDB-4-ITC)ocn964646379 | ||
035 | |a (OCoLC)964646379 | ||
035 | |a (DE-599)BVBBV045351639 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.6782 |2 23 | |
245 | 1 | 0 | |a Public cloud computing |b security and privacy guidelines |c Aiden E. Williams and Alexander L. Robinson, editors |
264 | 1 | |a Hauppauge, N.Y. |b Nova Science Publisher's |c 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Cloud computing |x Security measures |a Information technology |x Security measures |a Computer security | |
700 | 1 | |a Williams, Aiden E. |e Sonstige |4 oth | |
700 | 1 | |a Robinson, Alexander L. |e Sonstige |4 oth | |
710 | 2 | |a National Institute of Standards and Technology (U.S.) |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781620819821 |z 1620819821 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030738293 |
Datensatz im Suchindex
_version_ | 1804179177274867712 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045351639 |
collection | ZDB-4-ITC |
ctrlnum | (ZDB-4-ITC)ocn964646379 (OCoLC)964646379 (DE-599)BVBBV045351639 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01718nmm a2200445zc 4500</leader><controlfield tag="001">BV045351639</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781622570461</subfield><subfield code="9">978-1-62257-046-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1622570464</subfield><subfield code="9">1-62257-046-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn964646379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)964646379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045351639</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public cloud computing</subfield><subfield code="b">security and privacy guidelines</subfield><subfield code="c">Aiden E. Williams and Alexander L. Robinson, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hauppauge, N.Y.</subfield><subfield code="b">Nova Science Publisher's</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Aiden E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robinson, Alexander L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Institute of Standards and Technology (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781620819821</subfield><subfield code="z">1620819821</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030738293</subfield></datafield></record></collection> |
id | DE-604.BV045351639 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:43Z |
institution | BVB |
isbn | 9781622570461 1622570464 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030738293 |
oclc_num | 964646379 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Nova Science Publisher's |
record_format | marc |
spelling | Public cloud computing security and privacy guidelines Aiden E. Williams and Alexander L. Robinson, editors Hauppauge, N.Y. Nova Science Publisher's 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer security fast Information technology / Security measures fast Cloud computing Security measures Information technology Security measures Computer security Williams, Aiden E. Sonstige oth Robinson, Alexander L. Sonstige oth National Institute of Standards and Technology (U.S.) Sonstige oth Erscheint auch als Druck-Ausgabe 9781620819821 1620819821 |
spellingShingle | Public cloud computing security and privacy guidelines COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer security fast Information technology / Security measures fast Cloud computing Security measures Information technology Security measures Computer security |
title | Public cloud computing security and privacy guidelines |
title_auth | Public cloud computing security and privacy guidelines |
title_exact_search | Public cloud computing security and privacy guidelines |
title_full | Public cloud computing security and privacy guidelines Aiden E. Williams and Alexander L. Robinson, editors |
title_fullStr | Public cloud computing security and privacy guidelines Aiden E. Williams and Alexander L. Robinson, editors |
title_full_unstemmed | Public cloud computing security and privacy guidelines Aiden E. Williams and Alexander L. Robinson, editors |
title_short | Public cloud computing |
title_sort | public cloud computing security and privacy guidelines |
title_sub | security and privacy guidelines |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer security fast Information technology / Security measures fast Cloud computing Security measures Information technology Security measures Computer security |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Computer security Information technology / Security measures Cloud computing Security measures Information technology Security measures Computer security |
work_keys_str_mv | AT williamsaidene publiccloudcomputingsecurityandprivacyguidelines AT robinsonalexanderl publiccloudcomputingsecurityandprivacyguidelines AT nationalinstituteofstandardsandtechnologyus publiccloudcomputingsecurityandprivacyguidelines |