Cloud storage security a practical guide
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Elsevier
[date of publication not identified]
|
| Series: | Computer science reviews and trends
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.585 .W33 2015 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 96958 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220021835.0 | ||
| 008 | 221104 2015xxua b 000 0 eng d | ||
| 020 | |a 9780128029305 | ||
| 039 | 9 | |a 202211041137 |b VLOAD |c 201604261244 |d faezah |c 201604210918 |d adaviah |y 201512092018 |z zubir | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.585 |b .W33 2015 | ||
| 100 | 1 | |a Wheeler, Aaron |e author | |
| 245 | 1 | 0 | |a Cloud storage security |b a practical guide |c Aaron Wheeler, Michael Winburn |
| 264 | 1 | |a Waltham, MA |b Elsevier |c [date of publication not identified] | |
| 264 | 4 | |c © 2015 | |
| 300 | |a vi, 138 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a Computer science reviews and trends | |
| 504 | |a Includes bibliographical references | ||
| 505 | 0 | |a Data in the Cloud -- Applications in the Cloud -- Privacy Challenges -- Compliance -- Privacy Tools -- Best Practices -- The Future of Cloud Data Privacy and Security | |
| 520 | |a Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information | ||
| 592 | |a IN/11541 |b 11/03/2016 |c RM 164.33 |h INNOWAWASAN | ||
| 650 | 0 | |a Cloud computing |x Security measures | |
| 650 | 0 | |a Data protection | |
| 650 | 0 | |a Electronic books | |
| 700 | |a Winburn, Michael |e author | ||
| 830 | 0 | |a Computer science reviews and trends | |
| 999 | |a vtls000056128 |c 96958 |d 96958 | ||


