Elements of Cloud Computing Security (Record no. 51398)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02797nam a22005175i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-41411-9 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420220213.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160714s2016 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319414119 |
-- | 978-3-319-41411-9 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 004.6 |
100 1# - AUTHOR NAME | |
Author | Alani, Mohammed M. |
245 10 - TITLE STATEMENT | |
Title | Elements of Cloud Computing Security |
Sub Title | A Survey of Key Practicalities / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 55 p. 7 illus. |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | What is the Cloud? -- About Cloud Security -- Security Threats in Cloud Computing -- Security Attacks in Cloud Computing -- General Cloud Security Recommendations. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-41411-9 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Storage Representation. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2191-5768 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.