The Cloud understanding the security, privacy and trust challenges /
I tiakina i:
Kaituhi matua: | Robinson, Neil, 1964- |
---|---|
Ngā kaituhi rangatōpū: | ebrary, Inc, Rand Corporation, European Commission. Information Society DG |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Santa Monica :
Rand,
2011.
|
Rangatū: | Technical report (Rand Corporation) ;
TR-933-EC. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Securing the cloud cloud computer security techniques and tactics /
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
Resource optimization and security for cloud services /
mā: Xiong, Kaiqi
I whakaputaina: (2014)
mā: Xiong, Kaiqi
I whakaputaina: (2014)
Cloud security a comprehensive guide to secure cloud computing /
mā: Krutz, Ronald L.
I whakaputaina: (2010)
mā: Krutz, Ronald L.
I whakaputaina: (2010)
Cryptography for security and privacy in cloud computing /
mā: Rass, Stefan, me ētahi atu.
I whakaputaina: (2014)
mā: Rass, Stefan, me ētahi atu.
I whakaputaina: (2014)
Cloud management and security /
mā: Abbadi, Imad M.
I whakaputaina: (2014)
mā: Abbadi, Imad M.
I whakaputaina: (2014)
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
mā: Salam, Abdul
I whakaputaina: (2015)
mā: Salam, Abdul
I whakaputaina: (2015)
Technology and privacy the new landscape /
I whakaputaina: (1997)
I whakaputaina: (1997)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
mā: Bolander, Brian, me ētahi atu.
I whakaputaina: (2014)
mā: Bolander, Brian, me ētahi atu.
I whakaputaina: (2014)
Privacy and anonymity in the digital era
I whakaputaina: (2006)
I whakaputaina: (2006)
The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice /
mā: Rountree, Derrick
I whakaputaina: (2014)
mā: Rountree, Derrick
I whakaputaina: (2014)
Cloud computing theory and practice /
mā: Marinescu, Dan C.
I whakaputaina: (2013)
mā: Marinescu, Dan C.
I whakaputaina: (2013)
Trustworthy cloud computing /
mā: Safonov, V. O. (Vladimir Olegovich)
I whakaputaina: (2016)
mā: Safonov, V. O. (Vladimir Olegovich)
I whakaputaina: (2016)
Cloud Computing Technik, Sicherheit und rechtliche Gestaltung /
mā: Bedner, Mark
I whakaputaina: (2013)
mā: Bedner, Mark
I whakaputaina: (2013)
The librarian's guide to academic research in the cloud /
mā: Ovadia, Steven
I whakaputaina: (2013)
mā: Ovadia, Steven
I whakaputaina: (2013)
Cloud computing moving IT out of the office.
I whakaputaina: (2012)
I whakaputaina: (2012)
A prehistory of the cloud /
mā: Hu, Tung-Hui
I whakaputaina: (2015)
mā: Hu, Tung-Hui
I whakaputaina: (2015)
Apache CloudStack Cloud computing leverage the power of CloudStack and learn to extend the CloudStack environment /
mā: Sabharwal, Navin
I whakaputaina: (2013)
mā: Sabharwal, Navin
I whakaputaina: (2013)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
mā: Calder, Alan, 1957-
I whakaputaina: (2005)
mā: Calder, Alan, 1957-
I whakaputaina: (2005)
OpenNebula 3 cloud computing set up, manage, and maintain your cloud and learn solutions for datacenter virtualization with this step-by-step practical guide /
mā: Toraldo, Giovanni
I whakaputaina: (2012)
mā: Toraldo, Giovanni
I whakaputaina: (2012)
Invasion of privacy! big brother and the company hackers /
mā: Weber, Michael
I whakaputaina: (2004)
mā: Weber, Michael
I whakaputaina: (2004)
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c /
mā: Antani, Ved
I whakaputaina: (2013)
mā: Antani, Ved
I whakaputaina: (2013)
Trust and security in collaborative computing
mā: Zou, Xukai, 1963-
I whakaputaina: (2008)
mā: Zou, Xukai, 1963-
I whakaputaina: (2008)
Advances in artificial intelligence for privacy protection and security
I whakaputaina: (2010)
I whakaputaina: (2010)
Web commerce security design and development /
mā: Nahari, Hadi
I whakaputaina: (2011)
mā: Nahari, Hadi
I whakaputaina: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010)
mā: Mularien, Peter
I whakaputaina: (2010)
Hybrid cloud for dummies
I whakaputaina: (2012)
I whakaputaina: (2012)
VMware vCloud Director cookbook /
mā: Langenhan, Daniel
I whakaputaina: (2013)
mā: Langenhan, Daniel
I whakaputaina: (2013)
Dictionary of information security
mā: Slade, Robert
I whakaputaina: (2006)
mā: Slade, Robert
I whakaputaina: (2006)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
mā: Li, Qing, me ētahi atu.
I whakaputaina: (2015)
mā: Li, Qing, me ētahi atu.
I whakaputaina: (2015)
Advanced content delivery, streaming, and cloud services /
I whakaputaina: (2014)
I whakaputaina: (2014)
Mastering network security
mā: Brenton, Chris
I whakaputaina: (2003)
mā: Brenton, Chris
I whakaputaina: (2003)
Computer security fundamentals /
mā: Easttom, Chuck
I whakaputaina: (2006)
mā: Easttom, Chuck
I whakaputaina: (2006)
Threat modeling : designing for security /
mā: Shostack, Adam
I whakaputaina: (2014)
mā: Shostack, Adam
I whakaputaina: (2014)
Microsoft private cloud computing
mā: Finn, Aidan W.
I whakaputaina: (2012)
mā: Finn, Aidan W.
I whakaputaina: (2012)
Getting started with ownCloud
mā: Patawari, Aditya
I whakaputaina: (2013)
mā: Patawari, Aditya
I whakaputaina: (2013)
Cloud development and deployment with Cloudbees /
mā: De loof, Nicolas
I whakaputaina: (2013)
mā: De loof, Nicolas
I whakaputaina: (2013)
Cloud computing and big data /
I whakaputaina: (2013)
I whakaputaina: (2013)
Getting Started with Citrix CloudPortal /
mā: Udayakumar, Ruthiyavan
I whakaputaina: (2013)
mā: Udayakumar, Ruthiyavan
I whakaputaina: (2013)
The misuse of information systems the impact of security countermeasures /
mā: D'Arcy, John P., 1975-
I whakaputaina: (2007)
mā: D'Arcy, John P., 1975-
I whakaputaina: (2007)
Security in distributed, grid, mobile, and pervasive computing /
mā: Xiao, Yang
I whakaputaina: (2007)
mā: Xiao, Yang
I whakaputaina: (2007)
Ngā tūemi rite
-
Securing the cloud cloud computer security techniques and tactics /
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011) -
Resource optimization and security for cloud services /
mā: Xiong, Kaiqi
I whakaputaina: (2014) -
Cloud security a comprehensive guide to secure cloud computing /
mā: Krutz, Ronald L.
I whakaputaina: (2010) -
Cryptography for security and privacy in cloud computing /
mā: Rass, Stefan, me ētahi atu.
I whakaputaina: (2014) -
Cloud management and security /
mā: Abbadi, Imad M.
I whakaputaina: (2014)