Cloud Computing with Security (Record no. 75722)

000 -LEADER
fixed length control field 03856nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-030-24612-9
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801213907.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190904s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783030246129
-- 978-3-030-24612-9
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
100 1# - AUTHOR NAME
Author Sehgal, Naresh Kumar.
245 10 - TITLE STATEMENT
Title Cloud Computing with Security
Sub Title Concepts and Practices /
250 ## - EDITION STATEMENT
Edition statement 2nd ed. 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XLIV, 355 p. 206 illus., 190 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Foundations of Cloud Computing -- Cloud Computing Pyramid -- Features of Private and Public Clouds -- Cloud Workload Characterization -- Cloud Management and Monitoring -- Cloud Computing and Information Security -- Migrating to Cloud -- Migrating a Complex Industry to Cloud -- Cost and Billing practices in Cloud -- Analytics in the Cloud -- Additional Security Considerations for Clouds -- Future trends in Cloud Computing -- A Quick Test of your Cloud fundamentals grasp -- Hands-on project to use Cloud Service Provider.
520 ## - SUMMARY, ETC.
Summary, etc This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices. Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud; Describes for IT managers how to improve their Cloud Computing infrastructures; Includes coverage of security concerns with Cloud operating models; Uses several case studies to illustrate the “why’s and how’s” of migrating to the Cloud.
700 1# - AUTHOR 2
Author 2 Bhatt, Pramod Chandra P.
700 1# - AUTHOR 2
Author 2 Acken, John M.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-030-24612-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2020.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks .
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.