Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.

LEADER 00000cam  2200745Ki 4500 
001    809543567 
003    OCoLC 
005    20181101051934.3 
006    m     o  d         
007    cr cnu---unuuu 
008    120910s2013    enk     ob    001 0 eng d 
010    2012946924 
019    985043379|a990637327|a1005773375|a1026442974 
020    9781447141891|q(electronic bk.) 
020    144714189X|q(electronic bk.) 
020    1447141881 
020    9781447141884 
020    1447157931 
020    9781447157939 
020    |z9781447141884 
024 7  10.1007/978-1-4471-4189-1|2doi 
035    (OCoLC)809543567|z(OCoLC)985043379|z(OCoLC)990637327
       |z(OCoLC)1005773375|z(OCoLC)1026442974 
040    GW5XE|beng|epn|erda|cGW5XE|dCOO|dOCLCQ|dZMC|dB24X7|dN$T
       |dYDXCP|dVMC|dDEBSZ|dOHS|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dDGU
       |dVT2|dZ5A|dLIP|dOCLCO|dLIV|dESU|dOCLCQ|dIOG|dOCLCO|dOCLCA
       |dREB|dOCLCO|dOCLCF|dOCLCO|dCEF|dU3W|dOCLCO|dAU@|dOCLCO 
049    MAIN 
050  4 QA76.585|b.P75 2013 
072  7 COM|x060030|2bisacsh 
072  7 COM|x060080|2bisacsh 
072  7 UYD|2bicssc 
082 04 004.67/82|223 
245 00 Privacy and security for cloud computing /|cSiani Pearson,
       George Yee, editors. 
264  1 London ;|aNew York :|bSpringer,|c2013. 
300    1 online resource. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc|0http://rdaregistry.info/termList/
       RDAColourContent/1003 
347    text file|2rdaft|0http://rdaregistry.info/termList/
       fileType/1002 
490 1  Computer communications and networks,|x1617-7975 
504    Includes bibliographical references and index. 
505 00 |gPart 1.|tIntroduction to the Issues --|tPrivacy, 
       Security and Trust in Cloud Computing /|rSiani Pearson --
       |gPart 2.|tLaw Enforcement and Audits --|tAccessing Data 
       in the Cloud: The Long Arm of the Law Enforcement Agent /
       |rIan Walden --|tA Privacy Impact Assessment Tool for 
       Cloud Computing /|rDavid Tancock, Siani Pearson and Andrew
       Charlesworth --|tUnderstanding Cloud Audits /|rFrank 
       Doelitzscher, Christoph Reich, Martin Knahl and Nathan 
       Clarke --|gPart 3.|tSecurity and Integrity --|tSecurity 
       Infrastructure for Dynamically Provisioned Cloud 
       Infrastructure Services /|rYuri Demchenko, Canh Ngo, Cees 
       de Laat, Diego R. Lopez and Antonio Morales, et al. --
       |tModeling the Runtime Integrity of Cloud Servers: A 
       Scoped Invariant Perspective /|rJinpeng Wei, Calton Pu, 
       Carlos V. Rozas, Anand Rajan and Feng Zhu --|gPart 4.
       |tRisk Considerations --|tInadequacies of Current Risk 
       Controls for the Cloud /|rSadie Creese, Michael Goldsmith 
       and Paul Hopkins --|tEnterprise Information Risk 
       Management: Dealing with Cloud Computing /|rAdrian Baldwin,
       David Pym and Simon Shiu. 
520    Despite the enormous potential of cloud computing, 
       consumer uncertainty and concern regarding issues of 
       privacy, security and trust remain a major barrier to the 
       switch to cloud models. This comprehensive and 
       authoritative text/reference provides an in-depth analysis
       of the latest advances in privacy, security and risk 
       technologies within cloud environments. Containing 
       contributions from leading experts in the field, the text 
       presents both a thorough introduction to the core issues, 
       and a practical selection of innovative solutions to 
       common problems. A Glossary is also included at the end of
       the book. Topics and features: Considers the various 
       forensic challenges for legal access to data in a cloud 
       computing environment. Discusses privacy impact 
       assessments for the cloud, and examines the use of cloud 
       audits to attenuate cloud security problemsReviews 
       conceptual issues, basic requirements and practical 
       suggestions for provisioning dynamically configured access
       control services in the cloud. Proposes scoped invariants 
       as a primitive for analyzing a cloud server for its 
       integrity propertiesInvestigates the applicability of 
       existing controls for mitigating information security 
       risks to cloud computing environments. Describes risk 
       management for cloud computing from an enterprise 
       perspective. This pioneering volume is essential reading 
       for business professionals, students and researchers 
       interested in the field of privacy and security protection
       for the cloud, and/or complex service provisioning. 
       Newcomers to these areas will benefit from the solid 
       overview of the field, whereas established experts will 
       value the novel, cutting-edge research described in the 
       work. 
546    English. 
650  0 Cloud computing|0http://id.loc.gov/authorities/subjects/
       sh2008004883|xSecurity measures.|0http://id.loc.gov/
       authorities/subjects/sh99005297 
650  0 Data protection.|0http://id.loc.gov/authorities/subjects/
       sh85035859 
650  0 Computer networks|xSecurity measures.|0http://id.loc.gov/
       authorities/subjects/sh94001277 
650  0 Internet|xSecurity measures.|0http://id.loc.gov/
       authorities/subjects/sh2008104644 
650  2 Internet.|0https://id.nlm.nih.gov/mesh/D020407 
650  2 Computer Security.|0https://id.nlm.nih.gov/mesh/D016494 
653  4 Computer science. 
653  4 Computer system performance. 
653  4 Computer network architectures. 
653  4 Information Systems. 
653  4 Performance and Reliability. 
653  4 Management of Computing and Information Systems. 
655  0 Electronic books. 
655  4 Electronic books. 
700 1  Pearson, Siani.|0http://id.loc.gov/authorities/names/
       no2002101481 
700 1  Yee, George.|0http://id.loc.gov/authorities/names/
       n2005080894 
776 08 |iPrint version:|tPrivacy and security for cloud 
       computing.|dLondon ; New York : Springer, 2013|w(DLC)  
       2012946924 
830  0 Computer communications and networks.|0http://id.loc.gov/
       authorities/names/n00009315 
990    SpringerLink|bSpringer English/International eBooks 2013 -
       Full Set|c2018-10-31|yNew collection 
       springerlink.ebooks2013|5OH1 
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team