Cloud computing security (Record no. 18362)

MARC details
000 -LEADER
fixed length control field 05829cam a2200613K 4500
001 - CONTROL NUMBER
control field 9780429055126
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220724194512.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200907s2021 flu ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429621796
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0429621795
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429055126
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0429055129
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429617492
Qualifying information (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0429617496
Qualifying information (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780429619649
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0429619642
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0367658402
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367658403
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 036756033X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367560331
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1193069843
Canceled/invalid control number (OCoLC)1193127054
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1193069843
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 012040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 00 - TITLE STATEMENT
Title Cloud computing security
Medium [electronic resource] :
Remainder of title foundations and challenges /
Statement of responsibility, etc. edited by John R. Vacca.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. CRC Press, Taylor & Francis Group,
Date of publication, distribution, etc. 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- About the Editor -- Contributors -- Section I Introduction -- Chapter 1 Cloud Computing Essentials -- 1.1 Introduction to Cloud Computing -- 1.2 Characteristics of Cloud Computing -- 1.3 Cloud Computing Models -- 1.3.1 Service Models -- 1.3.1.1 Infrastructure-as-a-Service -- 1.3.1.2 Platform-as-a-Service -- 1.3.1.3 Software-as-a-Service -- 1.3.2 Deployment Models -- 1.4 Cloud Services and Technologies -- 1.5 Research Challenges -- 1.6 Summary -- Further Reading
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.3 Classification and Countermeasures -- 4.3.1 Infrastructure and Host Threats -- 4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure -- 4.3.1.2 Unauthorized Physical Access to Facilities or Equipment -- 4.3.1.3 Deficient Training/Negligence of Employees -- 4.3.1.4 Dumpster Diving -- 4.3.1.5 Password Guessing -- 4.3.1.6 Unauthorized Access to Data or Information Technology Systems -- 4.3.1.7 Compromise of Operational Security Logs -- 4.3.1.8 Network Breaks -- 4.3.1.9 Privilege Escalation -- 4.3.1.10 Insecure or Ineffective Data Deletion -- 4.3.1.11 Malicious Scanning or Observation
520 ## - SUMMARY, ETC.
Summary, etc. This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features Covers patching and configuration vulnerabilities of a cloud server Evaluates methods for data encryption and long-term storage in a cloud server Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Graphics / Game Programming & Design
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Information Technology
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Vacca, John R.,
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Read Online
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBook

No items available.

To Reach Us

0206993118
amiu.library@amref.ac.ke

Our Location

Lang’ata Road, opposite Wilson Airport
PO Box 27691 – 00506,   Nairobi, Kenya

Social Networks

Powered by Koha