000 02948cam a2200457Ki 4500
001 ocn968779987
003 OCoLC
005 20190719103425.0
006 m o d
007 cr cnu---unuuu
008 170117s2017 ne a ob 001 0 eng d
040 _aOPELS
_beng
_erda
_epn
_cOPELS
_dOCLCO
_dTEF
_dYDX
_dN$T
_dUAB
_dCOO
_dUPM
_dOCLCQ
_dVGM
_dOTZ
_dD6H
_dU3W
_dKSU
019 _a968211884
020 _a9780128096871
_q(electronic bk.)
020 _a012809687X
_q(electronic bk.)
020 _z9780128097106
_q(pbk.)
020 _z0128097108
_q(pbk.)
035 _a(OCoLC)968779987
_z(OCoLC)968211884
050 4 _aQA76.585
_b.M48 2017eb
072 7 _aCOM
_x060030
_2bisacsh
072 7 _aCOM
_x060080
_2bisacsh
082 0 4 _a004.67/82
_223
100 1 _aMetheny, Matthew,
_eauthor.
245 1 0 _aFederal cloud computing :
_bthe definitive guide for cloud service providers /
_cMatthew Metheny.
250 _aSecond edition.
264 1 _aAmsterdam :
_bSyngress, is an imprint of Elsevier,
_c[2017]
300 _a1 online resource :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _a"In recent years 'cloud computing' has emerged as a model for providing IT infrastructure, resources and services that has the potential to drive significant value to organizations through increased IT efficiency, agility and innovation. However, Federal agencies who were early adopters of cloud computing have learned that there are many challenges and risks that must be addressed in order to realize these benefits"--
_cProvided by publisher.
504 _aIncludes bibliographical references and index.
505 8 _aMachine generated contents note: Chapter 1 -- Introduction to the Federal Cloud Computing Strategy Chapter 2 -- Cloud Computing Standards Chapter 3 -- A Case for Open Source Chapter 4 -- Security and Privacy in Public Cloud Computing Chapter 5 -- Applying the NIST Risk Management Framework Chapter 6 -- Risk Management Chapter 7 -- Comparison of FISMA with Other Security Compliance Standards Chapter 8 -- FedRAMP Primer Chapter 9 -- The FedRAMP Cloud Computing Security Requirements Chapter 10 -- Assessment and Authorization (A & A): Governance, Preparation, and Execution Chapter 11 -- Strategies for Continuous Monitoring Chapter 12 -- Cost-Effective Compliance using Security Automation Appendix -- Federal-focused Case Study for Cloud Service Providers using the CSA GRC Stack.
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed January 23, 2017).
650 0 _aCloud computing
_xSecurity measures.
650 0 _aWeb services
_xGovernment policy.
650 7 _aCOMPUTERS / Networking / Intranets & Extranets.
_2bisacsh
650 7 _aCOMPUTERS / Web / General.
_2bisacsh
655 4 _aElectronic books.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128097106
999 _c504402
_d504337