Descripción del título

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing & mdash;utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, amon
Monografía
monografia Rebiun36955028 https://catalogo.rebiun.org/rebiun/record/Rebiun36955028 m o d cr un|---uuuuu 110725s2011 xx ob 001 0 eng d 816850879 1493354762 9781118116029 ebk) 111811602X ebk) 9781118116036 ebk) 1118116038 ebk) 9781118116043 ebk) 1118116046 ebk) 1283177269 9781283177269 9780470874745 9786613177261 6613177261 9781118269091 1118269098 AU@ 000053276243 DEBBG BV041910488 DEBSZ 396995748 IDEBK eng pn IDEBK STF COO EBLCP OCLCQ MEAUC DEBSZ OCLCQ UKDOC OCLCO OCLCQ YDXCP DEBBG OCLCO OCLCQ OCLCO LIV OCLCQ MERUC OCLCF CEF INT OCLCQ UAB OCLCQ UHL OCLCQ UKSSU BRF OCLCQ UKAHL OCLCO OCLCQ OCLCO OCLCL CLO KJQ bicssc 005.8 22 BUS003000 bisacsh Auditing Cloud Computing a Security and Privacy Guide Wiley 2011 Wiley 1 online resource (224) 1 online resource (224) Text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Wiley corporate F & A 21 Includes bibliographical references and index AUDITING CLOUD COMPUTING: A Security and Privacy Guide; Contents; Preface; Chapter 1: Introduction to Cloud Computing; Chapter 2: Cloud-Based IT Audit Process; Chapter 3: Cloud-Based IT Governance; Chapter 4: System and Infrastructure Lifecycle Management for the Cloud; Chapter 5: Cloud-Based IT Service Delivery and Support; Chapter 6: Protection and Privacy of Information Assets in the Cloud; Chapter 7: Business Continuity and Disaster Recovery; Chapter 8: Global Regulation and Cloud Computing; Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit Appendix: Cloud Computing Audit ChecklistAbout the Editor; About the Contributors; Index The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing & mdash;utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, amon English Business enterprises- Computer networks- Security measures Cloud computing- Security measures Information technology- Security measures Data protection Infonuagique- Sécurité- Mesures Technologie de l'information- Sécurité- Mesures Protection de l'information (Informatique) Business enterprises- Computer networks- Security measures. Data protection. Information technology- Security measures. Electronic resource Halpert, Ben 9780470874745 0470874740 Wiley corporate F & A series 21