NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cloud Security : (Record no. 4638)

MARC details
000 -LEADER
fixed length control field 04695cam a2200541Ki 4500
001 - CONTROL NUMBER
control field 9781003004486
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240213122823.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211007s2021 xx eo 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003004486
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003004482
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000528701
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000528707
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781032190266
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367435820
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000528770
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000528774
Qualifying information (electronic bk. : EPUB)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1273727301
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1273727301
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 000000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 059000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 021000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.67/82
Edition number 23/eng/20211018
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mishra, Preeti
Titles and words associated with a name (Computer scientist),
Relator term author.
245 10 - TITLE STATEMENT
Title Cloud Security :
Remainder of title Attacks, Techniques, Tools, and Challenges.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Place of publication not identified] :
Name of producer, publisher, distributor, manufacturer Chapman and Hall/CRC,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (240 pages).
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1: Fundamentals: Basics of Cloud Computing along with Security Aspects.1. Introduction to Cloud Computing. 2. Introduction to Cloud Security. 3. Cloud Security and Privacy Issues.Part 2: Threat Model, Attacks, Defense Systems and Security Techniques4. Threat Model and Cloud Attacks. 5. Classification of Intrusion DetectionSystems in Cloud. 6.Intrusion Detection Techniquesin Cloud. Part 3: Tools and Advances7. Overview of Tools (Attack/Security) in Cloud.8. Virtual Machine Introspection and Hypervisor Introspection. 9. Container Security.
520 ## - SUMMARY, ETC.
Summary, etc. Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis ⁰́₃ case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI ⁰́₃ case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Engineering
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Database Management / General
Source of heading or term bisacsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud computing
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pilli, Emmanuel S.
Fuller form of name (Emmanuel Shubhakar),
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Joshi, R. C.,
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003004486">https://www.taylorfrancis.com/books/9781003004486</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>

No items available.