Handbook of research on security considerations in cloud computing
Saved in:
| Other Authors | , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2015]
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781466683884 9781680158304 |
| Physical Description | 1 online zdroj (PDFs (408 stran) :) ilustrace. |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 91104 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008101011.0 | ||
| 006 | m o d | ||
| 007 | cr |n | ||
| 008 | 150822s2015 paua fof 001 0 eng d | ||
| 999 | |c 91104 |d 91104 | ||
| 020 | |a 9781466683884 |q (ebook) | ||
| 020 | |a 9781680158304 |q (ebook) | ||
| 024 | 7 | |a 10.4018/978-1-4666-8387-7 |2 doi | |
| 035 | |a (OCoLC)919099449 | ||
| 040 | |a IGIGL |b eng |e rda |c IGIGL |d OCLCO |d N$T |d CDX |d KNOVL |d EBLCP |d NRC |d OCLCF | ||
| 072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
| 080 | |a 004.771 |2 MRF | ||
| 080 | |a 004.056 |2 MRF | ||
| 080 | |a (035) |2 MRF | ||
| 080 | |a (0.034.2:08) |2 MRF | ||
| 245 | 0 | 0 | |a Handbook of research on security considerations in cloud computing / |c Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. |
| 264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2015] | |
| 300 | |a 1 online zdroj (PDFs (408 stran) :) |b ilustrace. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 504 | |a Obsahuje bibliografické odkazy a index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
| 520 | 3 | |a "This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Resumé vydavatele | |
| 588 | |a Description based on title screen (IGI Global, viewed 08/22/2015). | ||
| 590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
| 650 | 0 | 7 | |a cloud computing |7 ph579331 |2 czenas |
| 650 | 0 | 7 | |a počítačová bezpečnost |7 ph165952 |2 czenas |
| 650 | 0 | 9 | |a cloud computing |2 eczenas |
| 650 | 0 | 9 | |a computer security |2 eczenas |
| 655 | 7 | |a příručky |7 fd133209 |2 czenas | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a handbooks and manuals |2 eczenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Munir, Kashif, |d 1976- |e editor. | |
| 700 | 1 | |a Al-Mutairi, Mubarak S., |d 1971- |e editor. | |
| 700 | 1 | |a Mohammed, Lawan Ahmed, |d 1968- |e editor. | |
| 710 | 2 | |a IGI Global, |e publisher. | |
| 776 | 0 | 8 | |i Print version: |z 1466683872 |z 9781466683877 |w (DLC) 2015008172 |
| 856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1058854&authtype=ip,shib&custid=s3936755 |
| 942 | |2 udc | ||
| 992 | |c EBOOK-TN |c EBSCO | ||
| 993 | |x NEPOSILAT |y EIZ | ||