Cloud security auditing:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2019]
|
Schriftenreihe: | Advances in information security
Volume 76 |
Schlagworte: | |
Beschreibung: | xi, 166 Seiten Illustrationen |
ISBN: | 9783030231309 9783030231279 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV047086923 | ||
003 | DE-604 | ||
005 | 20210625 | ||
007 | t| | ||
008 | 210114s2019 xx a||| |||| 00||| eng d | ||
020 | |a 9783030231309 |9 978-3-030-23130-9 | ||
020 | |a 9783030231279 |9 978-3-030-23127-9 | ||
035 | |a (OCoLC)1126402146 | ||
035 | |a (DE-599)BVBBV047086923 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
245 | 1 | 0 | |a Cloud security auditing |c Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
264 | 1 | |a Cham |b Springer |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xi, 166 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v Volume 76 | |
650 | 4 | |a Security | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Information systems | |
650 | 4 | |a Telecommunication | |
700 | 1 | |a Majumdar, Suryadipta |e Sonstige |0 (DE-588)1206896256 |4 oth | |
700 | 1 | |a Madi, Taous |e Sonstige |4 oth | |
700 | 1 | |a Wang, Yushun |e Sonstige |4 oth | |
700 | 1 | |a Tabiban, Azadeh |e Sonstige |4 oth | |
700 | 1 | |a Oqaily, Momen |e Sonstige |4 oth | |
700 | 1 | |a Alimohammadifar, Amir |e Sonstige |4 oth | |
700 | 1 | |a Jarraya, Yosr |e Sonstige |4 oth | |
700 | 1 | |a Pourzandi, Makan |e Sonstige |4 oth | |
700 | 1 | |a Wang, Lingyu |e Sonstige |4 oth | |
700 | 1 | |a Debbabi, Mourad |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-23128-6 |
830 | 0 | |a Advances in information security |v Volume 76 |w (DE-604)BV014168308 |9 76 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032493583 |
Datensatz im Suchindex
_version_ | 1823509336437030912 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author_GND | (DE-588)1206896256 |
building | Verbundindex |
bvnumber | BV047086923 |
classification_rvk | ST 277 ST 200 |
ctrlnum | (OCoLC)1126402146 (DE-599)BVBBV047086923 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV047086923</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210625</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">210114s2019 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030231309</subfield><subfield code="9">978-3-030-23130-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030231279</subfield><subfield code="9">978-3-030-23127-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126402146</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047086923</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud security auditing</subfield><subfield code="c">Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xi, 166 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 76</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Majumdar, Suryadipta</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1206896256</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Madi, Taous</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yushun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tabiban, Azadeh</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oqaily, Momen</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alimohammadifar, Amir</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jarraya, Yosr</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pourzandi, Makan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Lingyu</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Debbabi, Mourad</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-23128-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">Volume 76</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">76</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032493583</subfield></datafield></record></collection> |
id | DE-604.BV047086923 |
illustrated | Illustrated |
index_date | 2024-07-03T16:18:05Z |
indexdate | 2025-02-08T17:00:18Z |
institution | BVB |
isbn | 9783030231309 9783030231279 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032493583 |
oclc_num | 1126402146 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xi, 166 Seiten Illustrationen |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Cloud security auditing Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi Cham Springer [2019] © 2019 xi, 166 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Advances in information security Volume 76 Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Communications Engineering, Networks Data protection Computer network architectures Information systems Telecommunication Majumdar, Suryadipta Sonstige (DE-588)1206896256 oth Madi, Taous Sonstige oth Wang, Yushun Sonstige oth Tabiban, Azadeh Sonstige oth Oqaily, Momen Sonstige oth Alimohammadifar, Amir Sonstige oth Jarraya, Yosr Sonstige oth Pourzandi, Makan Sonstige oth Wang, Lingyu Sonstige oth Debbabi, Mourad Sonstige oth Erscheint auch als Online-Ausgabe 978-3-030-23128-6 Advances in information security Volume 76 (DE-604)BV014168308 76 |
spellingShingle | Cloud security auditing Advances in information security Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Communications Engineering, Networks Data protection Computer network architectures Information systems Telecommunication |
title | Cloud security auditing |
title_auth | Cloud security auditing |
title_exact_search | Cloud security auditing |
title_exact_search_txtP | Cloud security auditing |
title_full | Cloud security auditing Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
title_fullStr | Cloud security auditing Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
title_full_unstemmed | Cloud security auditing Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi |
title_short | Cloud security auditing |
title_sort | cloud security auditing |
topic | Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Communications Engineering, Networks Data protection Computer network architectures Information systems Telecommunication |
topic_facet | Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Communications Engineering, Networks Data protection Computer network architectures Information systems Telecommunication |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT majumdarsuryadipta cloudsecurityauditing AT maditaous cloudsecurityauditing AT wangyushun cloudsecurityauditing AT tabibanazadeh cloudsecurityauditing AT oqailymomen cloudsecurityauditing AT alimohammadifaramir cloudsecurityauditing AT jarrayayosr cloudsecurityauditing AT pourzandimakan cloudsecurityauditing AT wanglingyu cloudsecurityauditing AT debbabimourad cloudsecurityauditing |