000 | 06076cam a2200709Ii 4500 | ||
---|---|---|---|
001 | ocn913513664 | ||
003 | OCoLC | ||
005 | 20190328114811.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150709s2015 si ob 000 0 eng d | ||
010 | _a 2017287331 | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOPELS _dEBLCP _dDEBSZ _dTEFOD _dCDX _dYDXCP _dIDEBK _dTEFOD _dB24X7 _dCOO _dD6H _dZ5A _dVT2 _dVGM _dLIV _dOCLCQ _dMERUC _dOCLCQ _dRRP _dBUF _dWRM _dU3W _dOCLCF _dOCLCQ _dWYU |
||
019 |
_a914151841 _a988636253 _a1008956880 _a1066446158 |
||
020 |
_a9780128029312 _q(electronic bk.) |
||
020 |
_a0128029315 _q(electronic bk.) |
||
020 | _a0128029307 | ||
020 | _a9780128029305 | ||
020 | _z9780128029305 | ||
035 |
_a(OCoLC)913513664 _z(OCoLC)914151841 _z(OCoLC)988636253 _z(OCoLC)1008956880 _z(OCoLC)1066446158 |
||
050 | 4 | _aQA76.585 | |
072 | 7 |
_aCOM _x013000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x018000 _2bisacsh |
|
072 | 7 |
_aCOM _x067000 _2bisacsh |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x037000 _2bisacsh |
|
072 | 7 |
_aCOM _x052000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6782 _223 |
100 | 1 |
_aWheeler, Aaron, _eauthor. |
|
245 | 1 | 0 |
_aCloud storage security : a practical guide / _h[electronic resource] _cAaron Wheeler, Michael Winburn. |
264 | 1 |
_aAmsterdam, Netherlands : _bElsevier, _c2015 |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aComputer Science Reviews and Trends | |
504 | _aIncludes bibliographical references. | ||
588 | 0 | _aVendor-supplied metadata. | |
520 | _aCloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information. | ||
505 | 0 | _aFront Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email. | |
505 | 8 | _a2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service. | |
505 | 8 | _a2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media. | |
505 | 8 | _a2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy. | |
505 | 8 | _a2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends. | |
650 | 0 |
_aCloud computing _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 7 |
_aCOMPUTERS _xComputer Literacy. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xComputer Science. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xData Processing. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xHardware _xGeneral. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xInformation Technology. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xMachine Theory. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xReference. _2bisacsh |
|
650 | 7 |
_aData protection. _2fast _0(OCoLC)fst00887958 |
|
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic book. | |
700 | 1 |
_aWinburn, Michael, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aWheeler, Aaron. _tCloud Storage Security : A Practical Guide. _dBurlington : Elsevier Science, �2015 _z9780128029305 |
830 | 0 | _aComputer science reviews and trends. | |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128029305 |
999 |
_c247111 _d247111 |