000 | 02082naaaa2200349uu 4500 | ||
---|---|---|---|
003 | BUT | ||
005 | 20230404143649.0 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210420s2020 xx |||||o ||| eng|| d | ||
020 | _a9781838807030 | ||
020 | _a9781838807023 | ||
020 | _a9781838807047 | ||
040 |
_aoapen _coapen |
||
041 | 0 | _aeng | |
080 | _a004 | ||
100 | 1 |
_aHarkut, Dinesh G. _4edt |
|
245 | 1 | 0 |
_aCloud Computing Security _bConcepts and Practice |
260 |
_bIntechOpen _c2020 |
||
300 | _a1 electronic resource (128 p.) | ||
506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
520 | _aCloud computing is an emerging discipline that is changing the way corporate computing is and will be done in the future. Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organisations. There is little, if any, argument about the clear advantages of the cloud and its adoption can and will create substantial business benefits through reduced capital expenditure and increased business agility. However, there is one overwhelming question that is still hindering the adaption of the cloud: Is cloud computing secure? The most simple answer could be ‘Yes’, if one approaches the cloud in the right way with the correct checks and balances to ensure all necessary security and risk management measures are covered as the consequences of getting your cloud security strategy wrong could be more serious and may severely damage the reputation of organisations. | ||
540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by/3.0/ _2cc |
||
546 | _aEnglish | ||
650 | 0 |
_aСети, телекоммуникации, интернет _92231 |
|
653 | _aCloud computing | ||
700 | 1 |
_aHarkut, Dinesh G. _4oth |
|
856 | 4 | 0 |
_awww.oapen.org _uhttps://mts.intechopen.com/storage/books/9225/authors_book/authors_book.pdf _70 _zDownload |
856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/67687 _70 _zDescription |
909 |
_c4 _dDarya Shvetsova |
||
942 |
_2udc _cEE |
||
999 |
_c6318 _d6318 |