語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing cloud and mobilitya practit...
~
Lim, Ian.
Securing cloud and mobilitya practitioner's guide /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing cloud and mobility/ Ian Lim, Paul Hourani, E. Coleen Coolidge.
其他題名:
a practitioner's guide /
作者:
Lim, Ian.
其他作者:
Coolidge, E. Coleen.
出版者:
Boca, Raton, Fla. :Taylor & Francis, : 2013.,
面頁冊數:
1 online resource (xvii, 210 p.) :ill. :
提要註:
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
標題:
Mobile computing - Security measures. -
電子資源:
http://www.crcnetbase.com/isbn/9781439850572
ISBN:
9781439850572 (electronic bk.)
Securing cloud and mobilitya practitioner's guide /
Lim, Ian.
Securing cloud and mobility
a practitioner's guide /[electronic resource] :Ian Lim, Paul Hourani, E. Coleen Coolidge. - Boca, Raton, Fla. :Taylor & Francis,2013. - 1 online resource (xvii, 210 p.) :ill.
Includes bibliographical references.
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
ISBN: 9781439850572 (electronic bk.)Subjects--Topical Terms:
382636
Mobile computing
--Security measures.
LC Class. No.: QA76.585 / .L56 2013eb
Dewey Class. No.: 005.8
Securing cloud and mobilitya practitioner's guide /
LDR
:01686cam a2200277Ma 4500
001
287970
003
OCoLC
005
20151105041348.0
006
m o u
007
cr cn|||||||||
008
151124s2013 fluad ob 000 0 eng d
020
$a
9781439850572 (electronic bk.)
020
$a
1439850577 (electronic bk.)
020
$z
9781439850558 (hardback)
020
$z
1439850550
035
$a
(OCoLC)828743788
$z
(OCoLC)827235525
035
$a
ocn828743788
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
OCLCQ
$d
VLB
$d
YDXCP
$d
N
050
4
$a
QA76.585
$b
.L56 2013eb
082
0 4
$a
005.8
$2
23
100
1
$a
Lim, Ian.
$3
382632
245
1 0
$a
Securing cloud and mobility
$h
[electronic resource] :
$b
a practitioner's guide /
$c
Ian Lim, Paul Hourani, E. Coleen Coolidge.
260
$a
Boca, Raton, Fla. :
$c
2013.
$b
Taylor & Francis,
300
$a
1 online resource (xvii, 210 p.) :
$b
ill.
504
$a
Includes bibliographical references.
520
$a
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--
$c
Provided by publisher.
588
$a
Description based on print version record.
650
0
$a
Mobile computing
$x
Security measures.
$3
382636
650
0
$a
Cloud computing
$x
Security measures.
$3
382635
700
1
$a
Coolidge, E. Coleen.
$3
382634
700
1
$a
Hourani, Paul.
$3
382633
856
4 0
$u
http://www.crcnetbase.com/isbn/9781439850572
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入
請輸入帳號密碼
帳號(必備)
(請輸入學號/職號)
.
密碼
(請輸入學校電子郵件密碼)
.
本校和附屬機構教職員工生,可透過校務資訊系統【快速登入區】進行登入,不用再認證。
校內教職員工及學生
帳號:學號/職號;密碼:本校電子信箱密碼
附屬機構醫事人員、其他非編制內教職員工
帳號:職號;密碼:身份證號共10碼,英文字母大寫
校友及外校實習生
帳號:借書證上之條碼號;密碼:請點選忘記密碼重新設定
如有任何問題歡迎洽詢圖書館流通櫃台(分機2133*83;read@kmu.edu.tw),謝謝。
~請尊重智慧財產權,勿非法影印~
Login information for International Students: *Username: Student ID Password: KMU Email Password
If you have any question, please contact us. (Tel : 07-3121101#2133#83; Email: read@kmu.edu.tw)
~Please respect the Intellectual Property Rights, do not use illegal copies of textbooks ~
請在此電腦上記得個人資料
取消
忘記密碼? Forgot your password? (請注意!您必須已在系統登記E-mail信箱方能使用。且忘記密碼功能不適用校院內教職員及學生)