Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200949 a 4500 
001    496000431 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    100106s2009    cc a    ob    001 0 eng d 
015    GBA976752|2bnb 
016 7  015341699|2Uk 
019    469815943|a777400417|a780026836|a968118623|a969021822
       |a1044248030|a1056352043|a1060865057|a1062888005
       |a1073062150|a1103270216|a1113672385|a1129342583
       |a1153045507|a1154895126|a1192330720|a1240531154
       |a1244513594 
020    9781449391881|q(electronic bk.) 
020    1449391885|q(electronic bk.) 
020    9781449379513|q(electronic bk.) 
020    1449379516|q(electronic bk.) 
020    |q(pbk.) 
020    |q(pbk.) 
029 1  AU@|b000046437809 
029 1  AU@|b000062580495 
029 1  AU@|b000066230182 
029 1  CHBIS|b006152204 
029 1  CHVBK|b171343433 
029 1  DEBSZ|b355423510 
029 1  HEBIS|b291495087 
035    (OCoLC)496000431|z(OCoLC)469815943|z(OCoLC)777400417
       |z(OCoLC)780026836|z(OCoLC)968118623|z(OCoLC)969021822
       |z(OCoLC)1044248030|z(OCoLC)1056352043|z(OCoLC)1060865057
       |z(OCoLC)1062888005|z(OCoLC)1073062150|z(OCoLC)1103270216
       |z(OCoLC)1113672385|z(OCoLC)1129342583|z(OCoLC)1153045507
       |z(OCoLC)1154895126|z(OCoLC)1192330720|z(OCoLC)1240531154
       |z(OCoLC)1244513594 
037    CL0500000054|bSafari Books Online 
037    114FE899-E392-40C7-B0D5-70C2B6616BC0|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    UMI|beng|epn|cUMI|dCEF|dOCLCQ|dCUS|dDEBSZ|dN$T|dTEFOD
       |dYDXCP|dOCLCQ|dTEFOD|dOCLCQ|dOCLCO|dOCLCA|dFEM|dOCLCQ
       |dOCLCF|dOCLCA|dMOQ|dWYU|dUKAHL|dVT2|dUHL|dUKSSU|dINARC
       |dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO 
049    INap 
082 04 005.8 
082 04 005.8|222 
099    eBook O’Reilly for Public Libraries 
100 1  Mather, Tim. 
245 10 Cloud security and privacy /|cTim Mather, Subra 
       Kumaraswamy, and Shahed Latif.|h[O'Reilly electronic 
       resource] 
250    1st ed. 
260    Beijing ;|aCambridge [Mass.] :|bO'Reilly,|c©2009. 
300    1 online resource (xvii, 312 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
490 1  Theory in practice 
504    Includes bibliographical references and index. 
505 0  Introduction -- What is cloud computing? -- Infrastructure
       security -- Data security and storage -- Identity and 
       access management -- Security management in the cloud -- 
       Privacy -- Audit and compliance -- Examples of cloud 
       service providers -- Security-as-a-[cloud] service -- The 
       impact of cloud computing on the role of corporate IT -- 
       Conclusion, and the future of the cloud. 
520    You may regard cloud computing as an ideal way for your 
       company to control IT costs, but do you know how private 
       and secure this service really is? Not many people do. 
       With Cloud Security and Privacy, you'll learn what's at 
       stake when you trust your data to the cloud, and what you 
       can do to keep your virtual infrastructure and web 
       applications secure. Ideal for IT staffers, information 
       security and privacy practitioners, business managers, 
       service providers, and investors alike, this book offers 
       you sound advice from three well-known authorities in the 
       tech security world. You'll learn detailed information on 
       cloud computing security that-until now-has been sorely 
       lacking. Review the current state of data security and 
       storage in the cloud, including confidentiality, integrity,
       and availability Learn about the identity and access 
       management (IAM) practice for authentication, 
       authorization, and auditing of the users accessing cloud 
       services Discover which security management frameworks and
       standards are relevant for the cloud Understand the 
       privacy aspects you need to consider in the cloud, 
       including how they compare with traditional computing 
       models Learn the importance of audit and compliance 
       functions within the cloud, and the various standards and 
       frameworks to consider Examine security delivered as a 
       service-a different facet of cloud security<p. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer networks|xSecurity measures. 
650  0 Cloud computing|xSecurity measures. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Infonuagique|xSécurité|xMesures. 
650  7 Computer networks|xSecurity measures.|2blmlsh 
650  7 Cloud computing|xSecurity measures.|2blmlsh 
650  7 Réseaux informatiques.|2eclas 
650  7 Informatique en nuage.|2eclas 
650  7 Technologies de l'information et de la communication.
       |2eclas 
650  7 Sécurité informatique.|2eclas 
650  7 Délits informatiques.|2eclas 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Cloud Computing|2gnd 
650  7 Computersicherheit|2gnd 
650  7 Sicherheitsmassnahme.|2swd 
700 1  Kumaraswamy, Subra. 
700 1  Latif, Shahed. 
776 08 |iPrint version:|z9780596802769 
830  0 Theory in practice (Sebastopol, Calif.) 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780596806453/?ar
       |zAvailable on O’Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH26833684 
938    Askews and Holts Library Services|bASKH|nAH26833777 
938    EBSCOhost|bEBSC|n414816 
938    Internet Archive|bINAR|ncloudsecuritypri0000math 
938    YBP Library Services|bYANK|n7471052 
938    YBP Library Services|bYANK|n7481253 
994    92|bJFN