Cloud Computing : (Record no. 56609)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05358cam a2200433Mi 4500 |
001 - CONTROL NUMBER | |
control field | 337113 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20211207110826.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180928s2012 enk o 000 0 ENG d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781849283601 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781628700114 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781849283618 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1849283591 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781849283595 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1849283591 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781849283595 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | 337113 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)799769042 |
100 10 - MAIN ENTRY--PERSONAL NAME | |
Personal name | Carstensen, Jared |
245 10 - TITLE STATEMENT | |
Title | Cloud Computing : |
Remainder of title | Assessing the Risks. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
Name of publisher, distributor, etc. | IT Governance Publishing, |
Date of publication, distribution, etc. | 2012 ; |
Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
Name of publisher, distributor, etc. | IT Governance Publishing. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (297 pages) $a<length> |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. |
520 3# - SUMMARY, ETC. | |
Summary, etc. | What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic ThreeCharacteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understandi ... |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Morgenthal, JP |
Relationship | edt |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Golden, Bernard |
Relationship | edt |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Morgenthal, JP |
Relationship | edt |
700 10 - ADDED ENTRY--PERSONAL NAME | |
Personal name | Golden, Bernard |
Relationship | edt |
856 4# - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | EBOOK |
Suppress in OPAC | No |
No items available.