Protecting information assets and IT infrastructure in the cloud / (Record no. 72018)

000 -LEADER
fixed length control field 02939cam a2200565Ii 4500
001 - CONTROL NUMBER
control field 9780429261602
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212723.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190516s2019 flu o 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429261602
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0429261608
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429551895
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0429551894
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429523724
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0429523726
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429537196
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0429537190
-- (electronic bk. : EPUB)
082 04 - CLASSIFICATION NUMBER
Call Number 004.67/82
100 1# - AUTHOR NAME
Author Das, Ravindra,
245 10 - TITLE STATEMENT
Title Protecting information assets and IT infrastructure in the cloud /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (xviii, 300 pages).
505 0# - FORMATTED CONTENTS NOTE
Remark 2 1. Introduction to the CloudComputing Environment2. Amazon Web Services3. Threats and Risks to the Cloud Infrastructure and Risk Mitigation Strategies4. Cloud Data Protection5. Conclusion
520 ## - SUMMARY, ETC.
Summary, etc Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
500 ## - GENERAL NOTE
Remark 1 Includes index.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 De Guise, Preston,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9780429261602
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton, FL :
-- CRC Press,
-- 2019.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Information Technology
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / General
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- POLITICAL SCIENCE / Political Freedom & Security / International Security
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cloud computing
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks

No items available.