LEADER 00000cam a2200949 a 4500 001 496000431 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 100106s2009 cc a ob 001 0 eng d 015 GBA976752|2bnb 016 7 015341699|2Uk 019 469815943|a777400417|a780026836|a968118623|a969021822 |a1044248030|a1056352043|a1060865057|a1062888005 |a1073062150|a1103270216|a1113672385|a1129342583 |a1153045507|a1154895126|a1192330720|a1240531154 |a1244513594 020 9781449391881|q(electronic bk.) 020 1449391885|q(electronic bk.) 020 9781449379513|q(electronic bk.) 020 1449379516|q(electronic bk.) 020 |q(pbk.) 020 |q(pbk.) 029 1 AU@|b000046437809 029 1 AU@|b000062580495 029 1 AU@|b000066230182 029 1 CHBIS|b006152204 029 1 CHVBK|b171343433 029 1 DEBSZ|b355423510 029 1 HEBIS|b291495087 035 (OCoLC)496000431|z(OCoLC)469815943|z(OCoLC)777400417 |z(OCoLC)780026836|z(OCoLC)968118623|z(OCoLC)969021822 |z(OCoLC)1044248030|z(OCoLC)1056352043|z(OCoLC)1060865057 |z(OCoLC)1062888005|z(OCoLC)1073062150|z(OCoLC)1103270216 |z(OCoLC)1113672385|z(OCoLC)1129342583|z(OCoLC)1153045507 |z(OCoLC)1154895126|z(OCoLC)1192330720|z(OCoLC)1240531154 |z(OCoLC)1244513594 037 CL0500000054|bSafari Books Online 037 114FE899-E392-40C7-B0D5-70C2B6616BC0|bOverDrive, Inc. |nhttp://www.overdrive.com 040 UMI|beng|epn|cUMI|dCEF|dOCLCQ|dCUS|dDEBSZ|dN$T|dTEFOD |dYDXCP|dOCLCQ|dTEFOD|dOCLCQ|dOCLCO|dOCLCA|dFEM|dOCLCQ |dOCLCF|dOCLCA|dMOQ|dWYU|dUKAHL|dVT2|dUHL|dUKSSU|dINARC |dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO 049 INap 082 04 005.8 082 04 005.8|222 099 eBook O’Reilly for Public Libraries 100 1 Mather, Tim. 245 10 Cloud security and privacy /|cTim Mather, Subra Kumaraswamy, and Shahed Latif.|h[O'Reilly electronic resource] 250 1st ed. 260 Beijing ;|aCambridge [Mass.] :|bO'Reilly,|c©2009. 300 1 online resource (xvii, 312 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file 490 1 Theory in practice 504 Includes bibliographical references and index. 505 0 Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud. 520 You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security<p. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer networks|xSecurity measures. 650 0 Cloud computing|xSecurity measures. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures. 650 6 Infonuagique|xSécurité|xMesures. 650 7 Computer networks|xSecurity measures.|2blmlsh 650 7 Cloud computing|xSecurity measures.|2blmlsh 650 7 Réseaux informatiques.|2eclas 650 7 Informatique en nuage.|2eclas 650 7 Technologies de l'information et de la communication. |2eclas 650 7 Sécurité informatique.|2eclas 650 7 Délits informatiques.|2eclas 650 7 Computer networks|xSecurity measures|2fast 650 7 Cloud Computing|2gnd 650 7 Computersicherheit|2gnd 650 7 Sicherheitsmassnahme.|2swd 700 1 Kumaraswamy, Subra. 700 1 Latif, Shahed. 776 08 |iPrint version:|z9780596802769 830 0 Theory in practice (Sebastopol, Calif.) 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780596806453/?ar |zAvailable on O’Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH26833684 938 Askews and Holts Library Services|bASKH|nAH26833777 938 EBSCOhost|bEBSC|n414816 938 Internet Archive|bINAR|ncloudsecuritypri0000math 938 YBP Library Services|bYANK|n7471052 938 YBP Library Services|bYANK|n7481253 994 92|bJFN