Cloud Computing : (Record no. 56609)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05358cam a2200433Mi 4500 |
| 001 - CONTROL NUMBER | |
| control field | 337113 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20211207110826.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
| fixed length control field | m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr ||||||||||| |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | cr ||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 180928s2012 enk o 000 0 ENG d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781849283601 |
| Qualifying information | (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781628700114 |
| Qualifying information | (electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781849283618 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849283591 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849283595 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 1849283591 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Canceled/invalid ISBN | 9781849283595 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | 337113 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)799769042 |
| 100 10 - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Carstensen, Jared |
| 245 10 - TITLE STATEMENT | |
| Title | Cloud Computing : |
| Remainder of title | Assessing the Risks. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
| Name of publisher, distributor, etc. | IT Governance Publishing, |
| Date of publication, distribution, etc. | 2012 ; |
| Place of publication, distribution, etc. | Ely, Cambridgeshire, England : |
| Name of publisher, distributor, etc. | IT Governance Publishing. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource (297 pages) $a<length> |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security -- the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work. |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing. |
| 520 3# - SUMMARY, ETC. | |
| Summary, etc. | What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic ThreeCharacteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understandi ... |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Morgenthal, JP |
| Relationship | edt |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Golden, Bernard |
| Relationship | edt |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Morgenthal, JP |
| Relationship | edt |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Golden, Bernard |
| Relationship | edt |
| 856 4# - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=571554</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | EBOOK |
| Suppress in OPAC | No |
No items available.
