Handbook of research on security considerations in cloud computing
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects o...
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2015]
|
Subjects: | |
ISBN: | 9781466683884 9781680158304 |
Physical Description: | 1 online zdroj (PDFs (408 stran) :) ilustrace. |
LEADER | 02780cam a2200565 i 4500 | ||
---|---|---|---|
001 | 91104 | ||
003 | CZ ZlUTB | ||
005 | 20240914105517.0 | ||
006 | m o d | ||
007 | cr |n | ||
008 | 150822s2015 paua fof 001 0 eng d | ||
999 | |c 91104 |d 91104 | ||
020 | |a 9781466683884 |q (ebook) | ||
020 | |a 9781680158304 |q (ebook) | ||
024 | 7 | |a 10.4018/978-1-4666-8387-7 |2 doi | |
035 | |a (OCoLC)919099449 | ||
040 | |a IGIGL |b eng |e rda |c IGIGL |d OCLCO |d N$T |d CDX |d KNOVL |d EBLCP |d NRC |d OCLCF | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 004.771 |2 MRF | ||
080 | |a 004.056 |2 MRF | ||
080 | |a (035) |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
245 | 0 | 0 | |a Handbook of research on security considerations in cloud computing / |c Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2015] | |
300 | |a 1 online zdroj (PDFs (408 stran) :) |b ilustrace. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
504 | |a Obsahuje bibliografické odkazy a index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
520 | 3 | |a "This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Resumé vydavatele | |
588 | |a Description based on title screen (IGI Global, viewed 08/22/2015). | ||
590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
650 | 0 | 7 | |a cloud computing |7 ph579331 |2 czenas |
650 | 0 | 7 | |a počítačová bezpečnost |7 ph165952 |2 czenas |
650 | 0 | 9 | |a cloud computing |2 eczenas |
650 | 0 | 9 | |a computer security |2 eczenas |
655 | 7 | |a příručky |7 fd133209 |2 czenas | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a handbooks and manuals |2 eczenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Munir, Kashif, |d 1976- |e editor. | |
700 | 1 | |a Al-Mutairi, Mubarak S., |d 1971- |e editor. | |
700 | 1 | |a Mohammed, Lawan Ahmed, |d 1968- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1466683872 |z 9781466683877 |w (DLC) 2015008172 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1058854&authtype=ip,shib&custid=s3936755 |y Plný text |
942 | |2 udc | ||
992 | |c EBOOK-TN |c EBSCO | ||
993 | |x NEPOSILAT |y EIZ |