000 06076cam a2200709Ii 4500
001 ocn913513664
003 OCoLC
005 20190328114811.0
006 m o d
007 cr cnu|||unuuu
008 150709s2015 si ob 000 0 eng d
010 _a 2017287331
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dOPELS
_dEBLCP
_dDEBSZ
_dTEFOD
_dCDX
_dYDXCP
_dIDEBK
_dTEFOD
_dB24X7
_dCOO
_dD6H
_dZ5A
_dVT2
_dVGM
_dLIV
_dOCLCQ
_dMERUC
_dOCLCQ
_dRRP
_dBUF
_dWRM
_dU3W
_dOCLCF
_dOCLCQ
_dWYU
019 _a914151841
_a988636253
_a1008956880
_a1066446158
020 _a9780128029312
_q(electronic bk.)
020 _a0128029315
_q(electronic bk.)
020 _a0128029307
020 _a9780128029305
020 _z9780128029305
035 _a(OCoLC)913513664
_z(OCoLC)914151841
_z(OCoLC)988636253
_z(OCoLC)1008956880
_z(OCoLC)1066446158
050 4 _aQA76.585
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
082 0 4 _a004.6782
_223
100 1 _aWheeler, Aaron,
_eauthor.
245 1 0 _aCloud storage security : a practical guide /
_h[electronic resource]
_cAaron Wheeler, Michael Winburn.
264 1 _aAmsterdam, Netherlands :
_bElsevier,
_c2015
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aComputer Science Reviews and Trends
504 _aIncludes bibliographical references.
588 0 _aVendor-supplied metadata.
520 _aCloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
505 0 _aFront Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email.
505 8 _a2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service.
505 8 _a2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media.
505 8 _a2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy.
505 8 _a2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends.
650 0 _aCloud computing
_xSecurity measures.
650 0 _aData protection.
650 7 _aCOMPUTERS
_xComputer Literacy.
_2bisacsh
650 7 _aCOMPUTERS
_xComputer Science.
_2bisacsh
650 7 _aCOMPUTERS
_xData Processing.
_2bisacsh
650 7 _aCOMPUTERS
_xHardware
_xGeneral.
_2bisacsh
650 7 _aCOMPUTERS
_xInformation Technology.
_2bisacsh
650 7 _aCOMPUTERS
_xMachine Theory.
_2bisacsh
650 7 _aCOMPUTERS
_xReference.
_2bisacsh
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
655 4 _aElectronic books.
655 0 _aElectronic book.
700 1 _aWinburn, Michael,
_eauthor.
776 0 8 _iPrint version:
_aWheeler, Aaron.
_tCloud Storage Security : A Practical Guide.
_dBurlington : Elsevier Science, �2015
_z9780128029305
830 0 _aComputer science reviews and trends.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128029305
999 _c247111
_d247111