Show simple item record

dc.contributor.authorZhu, Shao Ying
dc.contributor.authorHill, Richard
dc.contributor.authorTrovati, Marcello
dc.date.accessioned2016-11-21T12:11:01Z
dc.date.available2016-11-21T12:11:01Z
dc.date.issued2015
dc.identifier.citationZhu, S. Y., Hill, R., Trovati, M. (2015) 'Guide to security assurance for cloud computing', Springer: Switzerlanden
dc.identifier.isbn978-3-319-25988-8
dc.identifier.urihttp://hdl.handle.net/10545/620923
dc.description.abstractThis practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://www.springer.com/la/book/9783319259864en
dc.subjectCloud computingen
dc.subjectSecurityen
dc.titleGuide to security assurance for cloud computingen
dc.typeBooken
dc.contributor.departmentUniversity of Derbyen
html.description.abstractThis practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.


This item appears in the following Collection(s)

Show simple item record