Search Results - Cloud computing

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    The Cloud understanding the security, privacy and trust challenges / by Robinson, Neil, 1964-

    Published 2011
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Cloud security a comprehensive guide to secure cloud computing / by Krutz, Ronald L.

    Published 2010
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Securing the cloud cloud computer security techniques and tactics / by Winkler, J. R. (Joachim R.)

    Published 2011
    Table of Contents: “…Introduction to cloud computing and security -- Cloud computing architecture -- Security concerns, risk issues, and legal aspects -- Securing the cloud, architecture -- Securing the cloud, data security -- Securing the cloud, key strategies and best practices -- Security criteria, building an internal cloud -- Security criteria, selecting an external cloud provider -- Evaluating cloud security, an information security framework -- Operating a cloud.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Resource optimization and security for cloud services / by Xiong, Kaiqi

    Published 2014
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5
  6. 6

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / by Salam, Abdul

    Published 2015
    Subjects: “…Cloud computing Security measures.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8

    Mastering windows network forensics and investigation

    Published 2012
    Table of Contents: “…Understanding and exploiting Windows networks -- pt. 2. Analyzing the computer -- pt. 3. Analyzing the logs -- pt. 4. Results, the cloud, and virtualization -- pt. 5. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9

    Handbook on securing cyber-physical critical infrastructure

    Published 2012
    Table of Contents: “…Platform secruity -- pt. 5. Cloud computing and data security -- pt. 6. Event monitoring and situation awareness -- pt. 7. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook