Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Securing cloud and mobility[electron...
~
Coolidge, E. Coleen.
Securing cloud and mobility[electronic resource] :a practitioner's guide /
Record Type:
Language materials, printed : Monograph/item
[NT 15000414]:
005.8
Title/Author:
Securing cloud and mobility : a practitioner's guide // Ian Lim, Paul Hourani, E. Coleen Coolidge.
Author:
Lim, Ian.
other author:
Hourani, Paul.
Published:
Boca, Raton, Fla. : : Taylor & Francis,, 2013.
Description:
1 online resource (xvii, 210 p.) : : ill.
Subject:
Cloud computing - Security measures.
Subject:
Mobile computing - Security measures.
ISBN:
9781439850572 (electronic bk.)
ISBN:
1439850577 (electronic bk.)
[NT 15000227]:
Includes bibliographical references.
[NT 15000229]:
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
Online resource:
http://www.crcnetbase.com/isbn/9781439850572
Securing cloud and mobility[electronic resource] :a practitioner's guide /
Lim, Ian.
Securing cloud and mobility
a practitioner's guide /[electronic resource] :Ian Lim, Paul Hourani, E. Coleen Coolidge. - Boca, Raton, Fla. :Taylor & Francis,2013. - 1 online resource (xvii, 210 p.) :ill.
Includes bibliographical references.
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
ISBN: 9781439850572 (electronic bk.)Subjects--Topical Terms:
412456
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .L56 2013eb
Dewey Class. No.: 005.8
Securing cloud and mobility[electronic resource] :a practitioner's guide /
LDR
:01686cam a2200277Ma 4500
001
427935
003
OCoLC
005
20151105041348.0
006
m o u
007
cr cn|||||||||
008
151130s2013 fluad ob 000 0 eng d
020
$a
9781439850572 (electronic bk.)
020
$a
1439850577 (electronic bk.)
020
$z
9781439850558 (hardback)
020
$z
1439850550
035
$a
(OCoLC)828743788
$z
(OCoLC)827235525
035
$a
ocn828743788
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
OCLCQ
$d
VLB
$d
YDXCP
$d
N
050
4
$a
QA76.585
$b
.L56 2013eb
082
0 4
$a
005.8
$2
23
100
1
$a
Lim, Ian.
$3
609194
245
1 0
$a
Securing cloud and mobility
$h
[electronic resource] :
$b
a practitioner's guide /
$c
Ian Lim, Paul Hourani, E. Coleen Coolidge.
260
$a
Boca, Raton, Fla. :
$b
Taylor & Francis,
$c
2013.
300
$a
1 online resource (xvii, 210 p.) :
$b
ill.
504
$a
Includes bibliographical references.
520
$a
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
$c
Provided by publisher.
588
$a
Description based on print version record.
650
0
$a
Cloud computing
$x
Security measures.
$3
412456
650
0
$a
Mobile computing
$x
Security measures.
$3
405108
700
1
$a
Hourani, Paul.
$3
609195
700
1
$a
Coolidge, E. Coleen.
$3
609196
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439850572
based on 0 review(s)
Multimedia
Multimedia file
http://www.crcnetbase.com/isbn/9781439850572
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login