It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part41.utf8:186969323:1628
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part41.utf8:186969323:1628?format=raw

LEADER: 01628cam a2200349 i 4500
001 2014031206
003 DLC
005 20150603082542.0
008 140806s2015 ne a 001 0 eng
010 $a 2014031206
020 $a9780124201255 (paperback)
040 $aDLC$beng$cDLC$erda$dDLC
042 $apcc
050 00 $aQA76.585$b.S376 2015
082 00 $a004.67/82$223
100 1 $aSamani, Raj,$eauthor.
245 10 $aCSA guide to cloud computing :$bimplementing cloud privacy and security /$cRaj Samani, Brian Honan, Jim Reavis ; Vladimir Jirasek, technical editor.
246 3 $aCloud Security Alliance guide to cloud computing
264 1 $aAmsterdam ;$aBoston :$bElsevier/Syngress, an imprint of Elsevier,$c[2015]
300 $axx, 216 pages :$billustrations ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
500 $aIncludes index.
505 8 $aMachine generated contents note: Cloud Computing: What Is it, and What's the Big Deal? Selecting and Engaging with a Cloud Service Provider Mobile Solutions and the Cloud Security Imperative Big Data and the Cloud Certification and Standards Real-Time Assurance The Threat Landscape Security Considerations for the Cloud The Privacy Imperative Compliance and Regulatory Issues Dark Clouds: What to Do in the Event of a Security Incident.
650 0 $aCloud computing.
650 0 $aCloud computing$xSecurity measures.
650 0 $aComputer security.
700 1 $aHonan, Brian,$eauthor.
700 1 $aReavis, Jim,$eauthor.
700 1 $aJirasek, Vladimir,$eeditor.
710 2 $aCSA (Organization)