Cloud security and privacy : (Record no. 3080)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2009 enka b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780596802769 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4088
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mather, Tim.
9 (RLIN) 8083
245 10 - TITLE STATEMENT
Title Cloud security and privacy :
Remainder of title an enterprise perspective on risks and compliance /
Statement of responsibility, etc. by Tim Mather, Subra Kumaraswamy, Shahed Latif.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Farnham :
Name of publisher, distributor, etc. O'Reilly,
Date of publication, distribution, etc. 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 312 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
520 ## - SUMMARY, ETC.
Summary, etc. Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. This book Addresses issues that affect any organization preparing to use cloud computing as an option. It covers the steps you need to take to ensure your web applications are secure and your data is safe.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud computing
General subdivision Security measures.
9 (RLIN) 8084
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumaraswamy, Subra.
9 (RLIN) 8085
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Latif, Shahed
9 (RLIN) 8086
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / MA.C 2009 006264 11/24/2019 1 11/24/2019 Books