Securing the cloud : cloud computer security techniques and tactics /

Includes bibliographical references and index

Bibliographic Details
Main Author: Winkler, J. R. (Joachim R.)
Format:
Language:eng
Published: Burlington, MA : Elsevier, 2011
Subjects:
_version_ 1826445557451718656
author Winkler, J. R. (Joachim R.)
author_facet Winkler, J. R. (Joachim R.)
author_sort Winkler, J. R. (Joachim R.)
collection OCEAN
description Includes bibliographical references and index
first_indexed 2024-03-05T10:44:18Z
format
id KOHA-OAI-TEST:444835
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T10:44:18Z
publishDate 2011
publisher Burlington, MA : Elsevier,
record_format dspace
spelling KOHA-OAI-TEST:4448352020-12-19T17:16:07ZSecuring the cloud : cloud computer security techniques and tactics / Winkler, J. R. (Joachim R.) Burlington, MA : Elsevier,2011engIncludes bibliographical references and indexIntroduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.PSZJBLCloud computingComputer securityComputer networksURN:ISBN:9781597495929 (pbk.)
spellingShingle Cloud computing
Computer security
Computer networks
Winkler, J. R. (Joachim R.)
Securing the cloud : cloud computer security techniques and tactics /
title Securing the cloud : cloud computer security techniques and tactics /
title_full Securing the cloud : cloud computer security techniques and tactics /
title_fullStr Securing the cloud : cloud computer security techniques and tactics /
title_full_unstemmed Securing the cloud : cloud computer security techniques and tactics /
title_short Securing the cloud : cloud computer security techniques and tactics /
title_sort securing the cloud cloud computer security techniques and tactics
topic Cloud computing
Computer security
Computer networks
work_keys_str_mv AT winklerjrjoachimr securingthecloudcloudcomputersecuritytechniquesandtactics