000 01430cam a22003614i 4500
005 20260115042032.0
008 100810s2009 cc a g b 001 0 eng
020 _a0596802765 (pbk.)
020 _a9780596802769 (pbk.)
040 _aMPL
_cMPL
_erda
041 0 _aara
042 _alccopycat
082 0 4 _a005.8
_222
100 1 _aMather, Tim
245 1 0 _aCloud security and privacy
_cTim Mather, Subra Kumaraswamy, and Shahed Latif
250 _a1st ed
264 0 _aBeijing
_aCambridge [Mass.]
_bO'Reilly
_c2009
300 _axvii, 312 pages
_billustrations
_c24 سم
336 _aنص
337 _aبدون وسيط
338 _aكتاب
490 1 _aTheory in practice
504 _aIncludes bibliographical references and index
505 0 _aIntroduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud
596 _a1
650 0 _aCloud computing
_xSecurity measures
650 0 _aComputer networks
_xSecurity measures
650 0 1 _aCloud Computing
650 0 1 _aComputersicherheit
650 0 1 _aSicherheitsmassnahme
700 1 _aKumaraswamy, Subra
700 1 _aLatif, Shahed
999 _c96571
_d96571