Trust in computer systems and the cloud / (Record no. 257173)

000 -LEADER
fixed length control field 03218nam a2200325 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field TH-BaBU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240716091809.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211109s2022 nju fob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DG1
Language of cataloging eng
Description conventions rda
Transcribing agency TH-BaBU
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119693017 (electronic bk.)
International Standard Book Number 9781119692317 (electronic bk.)
International Standard Book Number 9781119692324
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number B877T 2022
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bursell, Mike,
Relator term author.
245 10 - TITLE STATEMENT
Title Trust in computer systems and the cloud /
Statement of responsibility, etc. Mike Bursell.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice ©2022
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Matter -- Why Trust? -- Humans and Trust -- Trust Operations and Alternatives -- Defining Trust in Computing -- The Importance of Systems -- Blockchain and Trust -- The Importance of Time -- Systems and Trust -- Open Source and Trust -- Trust, the Cloud, and the Edge -- Hardware, Trust, and Confidential Computing -- Trust Domains -- A World of Explicit Trust -- References -- Index
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell's experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master's students in software architecture and security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Topical term or geographic name entry element Cloud computing
General subdivision Security measures.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3075945">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3075945</a>
Public note Electronic Resources
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Book

No items available.


- Copyright © 2022 Library and Learning Space -

Powered by Koha