Cloud security / (Record no. 90294)

000 -LEADER
fixed length control field 01972cam a2200373 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250425145516.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250425b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119790464
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119790468
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1303392172
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
Item number .C6635 2022
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6782
Edition number 23
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 004.6782
Item number C7755c 2022
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Coombs, Ted,
Relator term author.
245 10 - TITLE STATEMENT
Title Cloud security /
Statement of responsibility, etc by Ted Coombs.
246 3# - VARYING FORM OF TITLE
Title proper/short title Cloud security for dummies.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc John Wiley & Sons,
Date of publication, distribution, etc [2022]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2022.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 357 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier.
490 1# - SERIES STATEMENT
Series statement For dummies.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - CONTENTS
Formatted contents note Part 1. Getting started with cloud security: Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access -- Part 2. Acceptance: Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery -- Part 3. Business as usual: Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums -- Part 4. The part of tens: Ten steps to better cloud security ; Cloud security solutions.
520 ## - SUMMARY, ETC.
Summary, etc Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Security.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title --For dummies.
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type BOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Use restrictions Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
        In Process   COLLEGE LIBRARY COLLEGE LIBRARY SUBJECT REFERENCE 2025-04-25 ALBASA 004.6782 C781 2022 2025-04-25 2025-04-25 BOOK