Securing cloud and mobility a practitioner's guide /

"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpo...

Full description

Bibliographic Details
Main Author: Lim, Ian.
Other Authors: Hourani, Paul., Coolidge, E. Coleen.
Format: Electronic
Language:English
Published: Boca, Raton, Fla. : CRC Press, 2013.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 02116nam a2200361Ia 4500
001 32102
003 FlBoTFG
005 20130819150054.0
006 m|||||o||d||||||||
007 cr||||
008 130819s2013 flua ob 001 0 eng d
020 # # |a 9781439850572 (ebook : PDF) 
040 # # |a FlBoTFG  |c FlBoTFG 
090 # # |a QA76.585  |b .L56 2013 
092 # # |a 005.8  |b L732 
100 1 # |a Lim, Ian. 
245 1 0 |a Securing cloud and mobility  |b a practitioner's guide /  |c Ian Lim, E. Coleen Coolidge, Paul Hourani.  |h [electronic resource] : 
260 # # |a Boca, Raton, Fla. :  |b CRC Press,  |c 2013. 
300 # # |a xvii, 210 p. :  |b ill. 
500 # # |a "An Auerbach book." 
504 # # |a Includes bibliographical references and index. 
505 0 # |a pt. 1. Rethinking IT and security -- pt. 2. Deconstructing cloud security -- pt. 3. Securing private cloud computing -- pt. 4. Securing public clouds -- pt. 5. Securing mobile. 
520 # # |a "A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--  |c Provided by publisher. 
530 # # |a Also available in print format. 
538 # # |a Mode of access: World Wide Web. 
650 # 0 |a Cloud computing  |x Security measures. 
650 # 0 |a Mobile computing  |x Security measures. 
655 # 7 |a Electronic books.  |2 lcsh 
700 1 # |a Hourani, Paul. 
700 1 # |a Coolidge, E. Coleen. 
776 0 8 |z 9781439850558 (hardback) 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://marc.crcnetbase.com/isbn/9781439850572  |z View fulltext via EzAccess