Cloud Security : (Record no. 4638)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04695cam a2200541Ki 4500 |
001 - CONTROL NUMBER | |
control field | 9781003004486 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122823.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 211007s2021 xx eo 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003004486 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003004482 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000528701 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000528707 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781032190266 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367435820 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000528770 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000528774 |
Qualifying information | (electronic bk. : EPUB) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1273727301 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1273727301 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.585 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 000000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 059000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 021000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UB |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.67/82 |
Edition number | 23/eng/20211018 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Mishra, Preeti |
Titles and words associated with a name | (Computer scientist), |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Cloud Security : |
Remainder of title | Attacks, Techniques, Tools, and Challenges. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | [Place of publication not identified] : |
Name of producer, publisher, distributor, manufacturer | Chapman and Hall/CRC, |
Date of production, publication, distribution, manufacture, or copyright notice | 2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (240 pages). |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part 1: Fundamentals: Basics of Cloud Computing along with Security Aspects.1. Introduction to Cloud Computing. 2. Introduction to Cloud Security. 3. Cloud Security and Privacy Issues.Part 2: Threat Model, Attacks, Defense Systems and Security Techniques4. Threat Model and Cloud Attacks. 5. Classification of Intrusion DetectionSystems in Cloud. 6.Intrusion Detection Techniquesin Cloud. Part 3: Tools and Advances7. Overview of Tools (Attack/Security) in Cloud.8. Virtual Machine Introspection and Hypervisor Introspection. 9. Container Security. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis ⁰́₃ case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI ⁰́₃ case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / General |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Computer Engineering |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Database Management / General |
Source of heading or term | bisacsh |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cloud computing |
General subdivision | Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Pilli, Emmanuel S. |
Fuller form of name | (Emmanuel Shubhakar), |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Joshi, R. C., |
Relator term | author. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003004486">https://www.taylorfrancis.com/books/9781003004486</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.