000 | 02939cam a2200565Ii 4500 | ||
---|---|---|---|
001 | 9780429261602 | ||
003 | FlBoTFG | ||
005 | 20220711212723.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 190516s2019 flu o 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9780429261602 _q(electronic bk.) |
||
020 |
_a0429261608 _q(electronic bk.) |
||
020 |
_a9780429551895 _q(electronic bk. : Mobipocket) |
||
020 |
_a0429551894 _q(electronic bk. : Mobipocket) |
||
020 |
_a9780429523724 _q(electronic bk. : PDF) |
||
020 |
_a0429523726 _q(electronic bk. : PDF) |
||
020 |
_a9780429537196 _q(electronic bk. : EPUB) |
||
020 |
_a0429537190 _q(electronic bk. : EPUB) |
||
020 | _z9781138393325 | ||
035 | _a(OCoLC)1101422736 | ||
035 | _a(OCoLC-P)1101422736 | ||
050 | 4 |
_aQA76.585 _b.D37 2019 |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aPOL _x012000 _2bisacsh |
|
072 | 7 |
_aUR _2bicssc |
|
082 | 0 | 4 |
_a004.67/82 _223 |
100 | 1 |
_aDas, Ravindra, _eauthor. _916521 |
|
245 | 1 | 0 |
_aProtecting information assets and IT infrastructure in the cloud / _cby Ravi Das and Preston de Guise. |
264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c2019. |
|
300 | _a1 online resource (xviii, 300 pages). | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _a1. Introduction to the CloudComputing Environment2. Amazon Web Services3. Threats and Risks to the Cloud Infrastructure and Risk Mitigation Strategies4. Cloud Data Protection5. Conclusion | |
520 | _aToday, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets. | ||
500 | _aIncludes index. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 7 |
_aCOMPUTERS / Information Technology _2bisacsh _919105 |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh _96769 |
|
650 | 7 |
_aPOLITICAL SCIENCE / Political Freedom & Security / International Security _2bisacsh _919106 |
|
650 | 0 |
_aCloud computing _xSecurity measures. _94647 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
700 | 1 |
_aDe Guise, Preston, _eauthor. _919107 |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9780429261602 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 | _cEBK | ||
999 |
_c72018 _d72018 |