000 -LEADER |
fixed length control field |
01972cam a2200373 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250425145516.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250425b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119790464 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119790468 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1303392172 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.585 |
Item number |
.C6635 2022 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.6782 |
Edition number |
23 |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Classification number |
004.6782 |
Item number |
C7755c 2022 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Coombs, Ted, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cloud security / |
Statement of responsibility, etc |
by Ted Coombs. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Cloud security for dummies. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, New Jersey : |
Name of publisher, distributor, etc |
John Wiley & Sons, |
Date of publication, distribution, etc |
[2022] |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
©2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 357 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier. |
490 1# - SERIES STATEMENT |
Series statement |
For dummies. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - CONTENTS |
Formatted contents note |
Part 1. Getting started with cloud security: Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access -- Part 2. Acceptance: Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery -- Part 3. Business as usual: Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums -- Part 4. The part of tens: Ten steps to better cloud security ; Cloud security solutions. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cloud computing |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
--For dummies. |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
BOOK |