The Cloud understanding the security, privacy and trust challenges /
Furkejuvvon:
Váldodahkki: | Robinson, Neil, 1964- |
---|---|
Searvvušdahkkit: | ebrary, Inc, Rand Corporation, European Commission. Information Society DG |
Materiálatiipa: | Elektrovnnalaš E-girji |
Giella: | eaŋgalasgiella |
Almmustuhtton: |
Santa Monica :
Rand,
2011.
|
Ráidu: | Technical report (Rand Corporation) ;
TR-933-EC. |
Fáttát: | |
Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
Fáddágilkorat: |
Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Geahča maid
Securing the cloud cloud computer security techniques and tactics /
Dahkki: Winkler, J. R. (Joachim R.)
Almmustuhtton: (2011)
Dahkki: Winkler, J. R. (Joachim R.)
Almmustuhtton: (2011)
Resource optimization and security for cloud services /
Dahkki: Xiong, Kaiqi
Almmustuhtton: (2014)
Dahkki: Xiong, Kaiqi
Almmustuhtton: (2014)
Cloud security a comprehensive guide to secure cloud computing /
Dahkki: Krutz, Ronald L.
Almmustuhtton: (2010)
Dahkki: Krutz, Ronald L.
Almmustuhtton: (2010)
Cryptography for security and privacy in cloud computing /
Dahkki: Rass, Stefan, et al.
Almmustuhtton: (2014)
Dahkki: Rass, Stefan, et al.
Almmustuhtton: (2014)
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Dahkki: Salam, Abdul
Almmustuhtton: (2015)
Dahkki: Salam, Abdul
Almmustuhtton: (2015)
Cloud management and security /
Dahkki: Abbadi, Imad M.
Almmustuhtton: (2014)
Dahkki: Abbadi, Imad M.
Almmustuhtton: (2014)
Technology and privacy the new landscape /
Almmustuhtton: (1997)
Almmustuhtton: (1997)
vSphere design best practices : apply industry-accepted best practices to design reliable high-performance datacenters for your business needs /
Dahkki: Bolander, Brian, et al.
Almmustuhtton: (2014)
Dahkki: Bolander, Brian, et al.
Almmustuhtton: (2014)
Privacy and anonymity in the digital era
Almmustuhtton: (2006)
Almmustuhtton: (2006)
The basics of cloud computing : understanding the fundamentals of cloud computing in theory and practice /
Dahkki: Rountree, Derrick
Almmustuhtton: (2014)
Dahkki: Rountree, Derrick
Almmustuhtton: (2014)
Cloud computing theory and practice /
Dahkki: Marinescu, Dan C.
Almmustuhtton: (2013)
Dahkki: Marinescu, Dan C.
Almmustuhtton: (2013)
Trustworthy cloud computing /
Dahkki: Safonov, V. O. (Vladimir Olegovich)
Almmustuhtton: (2016)
Dahkki: Safonov, V. O. (Vladimir Olegovich)
Almmustuhtton: (2016)
Cloud Computing Technik, Sicherheit und rechtliche Gestaltung /
Dahkki: Bedner, Mark
Almmustuhtton: (2013)
Dahkki: Bedner, Mark
Almmustuhtton: (2013)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
Dahkki: Calder, Alan, 1957-
Almmustuhtton: (2005)
Dahkki: Calder, Alan, 1957-
Almmustuhtton: (2005)
Cloud computing moving IT out of the office.
Almmustuhtton: (2012)
Almmustuhtton: (2012)
Advances in artificial intelligence for privacy protection and security
Almmustuhtton: (2010)
Almmustuhtton: (2010)
A prehistory of the cloud /
Dahkki: Hu, Tung-Hui
Almmustuhtton: (2015)
Dahkki: Hu, Tung-Hui
Almmustuhtton: (2015)
The librarian's guide to academic research in the cloud /
Dahkki: Ovadia, Steven
Almmustuhtton: (2013)
Dahkki: Ovadia, Steven
Almmustuhtton: (2013)
Invasion of privacy! big brother and the company hackers /
Dahkki: Weber, Michael
Almmustuhtton: (2004)
Dahkki: Weber, Michael
Almmustuhtton: (2004)
Trust and security in collaborative computing
Dahkki: Zou, Xukai, 1963-
Almmustuhtton: (2008)
Dahkki: Zou, Xukai, 1963-
Almmustuhtton: (2008)
Apache CloudStack Cloud computing leverage the power of CloudStack and learn to extend the CloudStack environment /
Dahkki: Sabharwal, Navin
Almmustuhtton: (2013)
Dahkki: Sabharwal, Navin
Almmustuhtton: (2013)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Dahkki: Li, Qing, et al.
Almmustuhtton: (2015)
Dahkki: Li, Qing, et al.
Almmustuhtton: (2015)
Dictionary of information security
Dahkki: Slade, Robert
Almmustuhtton: (2006)
Dahkki: Slade, Robert
Almmustuhtton: (2006)
Web commerce security design and development /
Dahkki: Nahari, Hadi
Almmustuhtton: (2011)
Dahkki: Nahari, Hadi
Almmustuhtton: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Dahkki: Mularien, Peter
Almmustuhtton: (2010)
Dahkki: Mularien, Peter
Almmustuhtton: (2010)
OpenNebula 3 cloud computing set up, manage, and maintain your cloud and learn solutions for datacenter virtualization with this step-by-step practical guide /
Dahkki: Toraldo, Giovanni
Almmustuhtton: (2012)
Dahkki: Toraldo, Giovanni
Almmustuhtton: (2012)
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c /
Dahkki: Antani, Ved
Almmustuhtton: (2013)
Dahkki: Antani, Ved
Almmustuhtton: (2013)
Toward better usability, security, and privacy of information technology report of a workshop /
Almmustuhtton: (2010)
Almmustuhtton: (2010)
Hybrid cloud for dummies
Almmustuhtton: (2012)
Almmustuhtton: (2012)
Computer security fundamentals /
Dahkki: Easttom, Chuck
Almmustuhtton: (2006)
Dahkki: Easttom, Chuck
Almmustuhtton: (2006)
Mastering network security
Dahkki: Brenton, Chris
Almmustuhtton: (2003)
Dahkki: Brenton, Chris
Almmustuhtton: (2003)
VMware vCloud Director cookbook /
Dahkki: Langenhan, Daniel
Almmustuhtton: (2013)
Dahkki: Langenhan, Daniel
Almmustuhtton: (2013)
Advanced content delivery, streaming, and cloud services /
Almmustuhtton: (2014)
Almmustuhtton: (2014)
Enterprise information security and privacy
Almmustuhtton: (2009)
Almmustuhtton: (2009)
Threat modeling : designing for security /
Dahkki: Shostack, Adam
Almmustuhtton: (2014)
Dahkki: Shostack, Adam
Almmustuhtton: (2014)
The misuse of information systems the impact of security countermeasures /
Dahkki: D'Arcy, John P., 1975-
Almmustuhtton: (2007)
Dahkki: D'Arcy, John P., 1975-
Almmustuhtton: (2007)
Security in distributed, grid, mobile, and pervasive computing /
Dahkki: Xiao, Yang
Almmustuhtton: (2007)
Dahkki: Xiao, Yang
Almmustuhtton: (2007)
Aggressive network self-defense
Dahkki: Wyler, Neil R.
Almmustuhtton: (2005)
Dahkki: Wyler, Neil R.
Almmustuhtton: (2005)
Hacking the code ASP. NET web application security /
Dahkki: Burnett, Mark (Mark M.)
Almmustuhtton: (2004)
Dahkki: Burnett, Mark (Mark M.)
Almmustuhtton: (2004)
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL /
Almmustuhtton: (2006)
Almmustuhtton: (2006)
Geahča maid
-
Securing the cloud cloud computer security techniques and tactics /
Dahkki: Winkler, J. R. (Joachim R.)
Almmustuhtton: (2011) -
Resource optimization and security for cloud services /
Dahkki: Xiong, Kaiqi
Almmustuhtton: (2014) -
Cloud security a comprehensive guide to secure cloud computing /
Dahkki: Krutz, Ronald L.
Almmustuhtton: (2010) -
Cryptography for security and privacy in cloud computing /
Dahkki: Rass, Stefan, et al.
Almmustuhtton: (2014) -
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Dahkki: Salam, Abdul
Almmustuhtton: (2015)