Cloud security and privacy : (Record no. 3080)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 100301s2009 enka b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780596802769 (pbk.) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u4088 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Mather, Tim. |
| 9 (RLIN) | 8083 |
| 245 10 - TITLE STATEMENT | |
| Title | Cloud security and privacy : |
| Remainder of title | an enterprise perspective on risks and compliance / |
| Statement of responsibility, etc. | by Tim Mather, Subra Kumaraswamy, Shahed Latif. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Farnham : |
| Name of publisher, distributor, etc. | O'Reilly, |
| Date of publication, distribution, etc. | 2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 312 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. This book Addresses issues that affect any organization preparing to use cloud computing as an option. It covers the steps you need to take to ensure your web applications are secure and your data is safe. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cloud computing |
| General subdivision | Security measures. |
| 9 (RLIN) | 8084 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Kumaraswamy, Subra. |
| 9 (RLIN) | 8085 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Latif, Shahed |
| 9 (RLIN) | 8086 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / MA.C 2009 | 006264 | 11/24/2019 | 1 | 11/24/2019 | Books |