The Cloud understanding the security, privacy and trust challenges /
Sábháilte in:
Príomhchruthaitheoir: | Robinson, Neil, 1964- |
---|---|
Údair chorparáideacha: | ebrary, Inc, Rand Corporation, European Commission. Information Society DG |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Santa Monica :
Rand,
2011.
|
Sraith: | Technical report (Rand Corporation) ;
TR-933-EC. |
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Securing the cloud cloud computer security techniques and tactics /
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
Resource optimization and security for cloud services /
de réir: Xiong, Kaiqi
Foilsithe / Cruthaithe: (2014)
de réir: Xiong, Kaiqi
Foilsithe / Cruthaithe: (2014)
Cloud security a comprehensive guide to secure cloud computing /
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
Cryptography for security and privacy in cloud computing /
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
Cloud management and security /
de réir: Abbadi, Imad M.
Foilsithe / Cruthaithe: (2014)
de réir: Abbadi, Imad M.
Foilsithe / Cruthaithe: (2014)
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
de réir: Salam, Abdul
Foilsithe / Cruthaithe: (2015)
de réir: Salam, Abdul
Foilsithe / Cruthaithe: (2015)
Technology and privacy the new landscape /
Foilsithe / Cruthaithe: (1997)
Foilsithe / Cruthaithe: (1997)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
de réir: Bolander, Brian, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Bolander, Brian, et al.
Foilsithe / Cruthaithe: (2014)
Privacy and anonymity in the digital era
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice /
de réir: Rountree, Derrick
Foilsithe / Cruthaithe: (2014)
de réir: Rountree, Derrick
Foilsithe / Cruthaithe: (2014)
Cloud computing theory and practice /
de réir: Marinescu, Dan C.
Foilsithe / Cruthaithe: (2013)
de réir: Marinescu, Dan C.
Foilsithe / Cruthaithe: (2013)
Trustworthy cloud computing /
de réir: Safonov, V. O. (Vladimir Olegovich)
Foilsithe / Cruthaithe: (2016)
de réir: Safonov, V. O. (Vladimir Olegovich)
Foilsithe / Cruthaithe: (2016)
Cloud Computing Technik, Sicherheit und rechtliche Gestaltung /
de réir: Bedner, Mark
Foilsithe / Cruthaithe: (2013)
de réir: Bedner, Mark
Foilsithe / Cruthaithe: (2013)
The librarian's guide to academic research in the cloud /
de réir: Ovadia, Steven
Foilsithe / Cruthaithe: (2013)
de réir: Ovadia, Steven
Foilsithe / Cruthaithe: (2013)
Cloud computing moving IT out of the office.
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
A prehistory of the cloud /
de réir: Hu, Tung-Hui
Foilsithe / Cruthaithe: (2015)
de réir: Hu, Tung-Hui
Foilsithe / Cruthaithe: (2015)
Apache CloudStack Cloud computing leverage the power of CloudStack and learn to extend the CloudStack environment /
de réir: Sabharwal, Navin
Foilsithe / Cruthaithe: (2013)
de réir: Sabharwal, Navin
Foilsithe / Cruthaithe: (2013)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
OpenNebula 3 cloud computing set up, manage, and maintain your cloud and learn solutions for datacenter virtualization with this step-by-step practical guide /
de réir: Toraldo, Giovanni
Foilsithe / Cruthaithe: (2012)
de réir: Toraldo, Giovanni
Foilsithe / Cruthaithe: (2012)
Invasion of privacy! big brother and the company hackers /
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c /
de réir: Antani, Ved
Foilsithe / Cruthaithe: (2013)
de réir: Antani, Ved
Foilsithe / Cruthaithe: (2013)
Trust and security in collaborative computing
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
Advances in artificial intelligence for privacy protection and security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Hybrid cloud for dummies
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
VMware vCloud Director cookbook /
de réir: Langenhan, Daniel
Foilsithe / Cruthaithe: (2013)
de réir: Langenhan, Daniel
Foilsithe / Cruthaithe: (2013)
Dictionary of information security
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Li, Qing, et al.
Foilsithe / Cruthaithe: (2015)
Advanced content delivery, streaming, and cloud services /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Mastering network security
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Threat modeling : designing for security /
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
Microsoft private cloud computing
de réir: Finn, Aidan W.
Foilsithe / Cruthaithe: (2012)
de réir: Finn, Aidan W.
Foilsithe / Cruthaithe: (2012)
Getting started with ownCloud
de réir: Patawari, Aditya
Foilsithe / Cruthaithe: (2013)
de réir: Patawari, Aditya
Foilsithe / Cruthaithe: (2013)
Cloud development and deployment with Cloudbees /
de réir: De loof, Nicolas
Foilsithe / Cruthaithe: (2013)
de réir: De loof, Nicolas
Foilsithe / Cruthaithe: (2013)
Cloud computing and big data /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Getting Started with Citrix CloudPortal /
de réir: Udayakumar, Ruthiyavan
Foilsithe / Cruthaithe: (2013)
de réir: Udayakumar, Ruthiyavan
Foilsithe / Cruthaithe: (2013)
The misuse of information systems the impact of security countermeasures /
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
Security in distributed, grid, mobile, and pervasive computing /
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
Míreanna comhchosúla
-
Securing the cloud cloud computer security techniques and tactics /
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011) -
Resource optimization and security for cloud services /
de réir: Xiong, Kaiqi
Foilsithe / Cruthaithe: (2014) -
Cloud security a comprehensive guide to secure cloud computing /
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010) -
Cryptography for security and privacy in cloud computing /
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014) -
Cloud management and security /
de réir: Abbadi, Imad M.
Foilsithe / Cruthaithe: (2014)