Securing Cloud Services : (Record no. 1064266)

001 - CONTROL NUMBER
control field on1151189441
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200418s2020 xx o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Transcribing agency EBLCP
Modifying agency JSTOR
-- EBLCP
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781787782068
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1787782069
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000067092237
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1151189441
037 ## - SOURCE OF ACQUISITION
Stock number 22573/ctvwf5xwv
Source of stock number/acquisition JSTOR
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
Item number .N49 2020
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library TEXA
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.585
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) .N49 2020
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Newcombe, Lee.
245 10 - TITLE STATEMENT
Title Securing Cloud Services :
Remainder of title A Pragmatic Approach, Second Edition.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Ely :
Name of publisher, distributor, etc IT Governance Ltd,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (453 p.)
490 0# - SERIES STATEMENT
Series statement JSTOR eBooks
500 ## - GENERAL NOTE
General note Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title -- Copyright -- Preface -- About the Author -- Acknowledgements -- Contents -- Part 1: Securing Cloud services -- setting the scene -- Introduction -- Chapter 1: Introduction to Cloud computing -- Cloud computing -- Chapter 2: Overview of existing Cloud taxonomies and models -- Service models -- Deployment models -- Hybrid Cloud -- Chapter 3: The security balance -- Security benefits -- Data centre security -- Improved resilience -- Improved security patching -- Automation and DevSecOps -- Security expertise -- Knowledge sharing and situational awareness
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Improved information sharing mechanisms -- Renewal of security architecture and segmentation -- Potential pitfalls -- Availability -- Shadow IT -- Information leakage -- Lock-in -- Multi-tenancy -- Visibility -- Inflexible and/or inadequate terms and conditions -- Chapter 4: Security threats associated with Cloud computing -- Cloud provider staff -- Image/application providers -- Equipment manufacturers -- Competitors -- Crackers/hackers -- Insiders -- Governments -- Transport agents -- Identity providers -- Attribute providers -- Cloud brokers -- Chapter 5: Privacy and regulatory concerns
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Data protection issues -- Payment card industry issues -- Financial services and the Cloud -- Others -- Part 2: Securing Cloud services -- in practice -- Introduction -- Chapter 6: Introduction to security architecture -- What is security architecture? -- What is a service? -- Architectural layers -- Advantages of security architecture -- Chapter 7: Application of security architecture to cloud computing -- Security Reference Model -- Security service descriptions -- Service levels and contracts -- Service models and the Security Reference Model -- IaaS -- PaaS -- FaaS -- SaaS -- Conclusion
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 8: Security and the Cloud -- Existing guidance -- Common security services -- Hosting -- Compliance -- Security governance -- Cloud deployment models -- Chapter 9: Security and Infrastructure as a Service -- IaaS and the SRM -- Conclusion -- Chapter 10: Security and Platform as a Service -- PaaS and the SRM -- Chapter 11: Security and Software as a Service -- Chapter 12: Security and Function as a Service -- Part 3: Conclusion -- Introduction -- Chapter 13: Looking ahead -- Overview -- Enterprise perspective -- Cyber security perspective -- Chapter 14: Conclusion and summary
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Appendix A: SRM security service assignments -- Further reading
520 ## - SUMMARY, ETC.
Summary, etc Securing Cloud Services - A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. Manage the risks associated with Cloud computing - buy this book today!
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 5058
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Web services
General subdivision Security measures.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Newcombe, Lee
Title Securing Cloud Services : A Pragmatic Approach, Second Edition
Place, publisher, and date of publication Ely : IT Governance Ltd,c2020
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ezproxy.uttyler.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctvwcjj1n">https://ezproxy.uttyler.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctvwcjj1n</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform JSTOR DDA
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
994 ## -
-- 92
-- TEX
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 06/01/2020   QA76.585 .N49 2020 on1151189441 06/01/2020 https://ezproxy.uttyler.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctvwcjj1n 06/01/2020 Electronic Book