Securing the Cloud : (Record no. 233)

MARC details
000 -LEADER
fixed length control field 02537nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240822114222.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240813b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032475714
040 ## - CATALOGING SOURCE
Transcribing agency SIU
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 JRF 2023
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jr Franklin, Curtis.
245 ## - TITLE STATEMENT
Title Securing the Cloud :
Remainder of title security strategies for the ubiquitous data center
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. AUERBACH
Name of publisher, distributor, etc. AUERBACH PUBLICATIONS, [S.l.
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent 232 pages illustrations (black and white) ; 24 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction Chapter 2 We Need a New Model for Security Chapter 3 The Basics of IT Security: From Mainframe to Cloud Chapter 4 The Basics of Security Failure Chapter 5 The Basics of Fitting Security to Situation Chapter 6 Defining the Cloud to Protect Chapter 7 Infrastructure as a Service Chapter 8 Platform as a Service (PaaS)Chapter 9 Software as a Service Chapter 10 Virtual Desktop Infrastructure Chapter 11 Understand Your Cloud Type Chapter 12 Public Cloud Chapter 13 Private Cloud Chapter 14 Hybrid Cloud Chapter 15 Working with Your Cloud Provider Chapter 16 Protecting the Perimeter Chapter 17 Protecting the Contents Chapter 18 Protecting the Infrastructure Chapter 19 Tie the Cloud Using an Internal Management Framework Chapter 20 Closing Comments Index
520 ## - SUMMARY, ETC.
Summary, etc. This book present the principles of cloud computing security. From a definition of terms to key issues for service contracts, it's a must-have companion for anyone charged with protecting cloud-based assets or using cloud-based security to protect traditional computing assets.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Cloud computing Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Cloud Chapter
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Security Failure
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Security measures
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Date last checked out
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 13/08/2024   005.8 JRF 2023 SIU00342 13/08/2024 1 13/08/2024 Book  
    Dewey Decimal Classification     Symbiosis International University, Dubai Symbiosis International University, Dubai 22/08/2024 1 005.8 JRF 2023 SIU00343 22/10/2024 2 22/08/2024 Book 22/10/2024
All Rights Reserved to Symbiosis International University, Dubai

Powered by Koha