Cloud computing security (Record no. 18362)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05829cam a2200613K 4500 |
001 - CONTROL NUMBER | |
control field | 9780429055126 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220724194512.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200907s2021 flu ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780429621796 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0429621795 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780429055126 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0429055129 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780429617492 |
Qualifying information | (electronic bk. : Mobipocket) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0429617496 |
Qualifying information | (electronic bk. : Mobipocket) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780429619649 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0429619642 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 0367658402 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367658403 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 036756033X |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367560331 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1193069843 |
Canceled/invalid control number | (OCoLC)1193127054 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1193069843 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.585 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 012040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 032000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UB |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 00 - TITLE STATEMENT | |
Title | Cloud computing security |
Medium | [electronic resource] : |
Remainder of title | foundations and challenges / |
Statement of responsibility, etc. | edited by John R. Vacca. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton, FL : |
Name of publisher, distributor, etc. | CRC Press, Taylor & Francis Group, |
Date of publication, distribution, etc. | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- About the Editor -- Contributors -- Section I Introduction -- Chapter 1 Cloud Computing Essentials -- 1.1 Introduction to Cloud Computing -- 1.2 Characteristics of Cloud Computing -- 1.3 Cloud Computing Models -- 1.3.1 Service Models -- 1.3.1.1 Infrastructure-as-a-Service -- 1.3.1.2 Platform-as-a-Service -- 1.3.1.3 Software-as-a-Service -- 1.3.2 Deployment Models -- 1.4 Cloud Services and Technologies -- 1.5 Research Challenges -- 1.6 Summary -- Further Reading |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.3 Classification and Countermeasures -- 4.3.1 Infrastructure and Host Threats -- 4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure -- 4.3.1.2 Unauthorized Physical Access to Facilities or Equipment -- 4.3.1.3 Deficient Training/Negligence of Employees -- 4.3.1.4 Dumpster Diving -- 4.3.1.5 Password Guessing -- 4.3.1.6 Unauthorized Access to Data or Information Technology Systems -- 4.3.1.7 Compromise of Operational Security Logs -- 4.3.1.8 Network Breaks -- 4.3.1.9 Privilege Escalation -- 4.3.1.10 Insecure or Ineffective Data Deletion -- 4.3.1.11 Malicious Scanning or Observation |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features Covers patching and configuration vulnerabilities of a cloud server Evaluates methods for data encryption and long-term storage in a cloud server Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cloud computing |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Computer Graphics / Game Programming & Design |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Information Technology |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vacca, John R., |
Relator term | editor. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Read Online |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9780429055126">https://www.taylorfrancis.com/books/9780429055126</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | eBook |
No items available.