000745443 000__ 01608cam\a2200433Ii\4500 000745443 001__ 745443 000745443 005__ 20230306141309.0 000745443 006__ m\\\\\o\\d\\\\\\\\ 000745443 007__ cr\cn\nnnunnun 000745443 008__ 160314s2015\\\\sz\a\\\\o\\\\\001\0\eng\d 000745443 020__ $$a9783319259888$$qelectronic book 000745443 020__ $$a3319259881$$qelectronic book 000745443 020__ $$z9783319259864 000745443 0247_ $$a10.1007/978-3-319-25988-8$$2doi 000745443 035__ $$aSP(OCoLC)ocn944445110 000745443 035__ $$aSP(OCoLC)944445110 000745443 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE 000745443 049__ $$aISEA 000745443 050_4 $$aQA76.585 000745443 08204 $$a004.67/82$$223 000745443 24500 $$aGuide to security assurance for cloud computing$$h[electronic resource] /$$cShao Ying Zhu, Richard Hill, Marcello Trovati, editors. 000745443 264_1 $$aCham :$$bSpringer,$$c2015. 000745443 300__ $$a1 online resource (xviii, 229 pages) :$$billustrations. 000745443 336__ $$atext$$btxt$$2rdacontent 000745443 337__ $$acomputer$$bc$$2rdamedia 000745443 338__ $$aonline resource$$bcr$$2rdacarrier 000745443 4901_ $$aComputer communications and networks,$$x1617-7975 000745443 500__ $$aIncludes index. 000745443 506__ $$aAccess limited to authorized users. 000745443 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 14, 2016). 000745443 650_0 $$aCloud computing$$xSecurity measures. 000745443 7001_ $$aZhu, Shao Ying,$$eeditor. 000745443 7001_ $$aHill, Richard,$$eeditor. 000745443 7001_ $$aTrovati, Marcello,$$eeditor. 000745443 830_0 $$aComputer communications and networks. 000745443 85280 $$bebk$$hSpringerLink 000745443 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25988-8$$zOnline Access$$91397441.1 000745443 909CO $$ooai:library.usi.edu:745443$$pGLOBAL_SET 000745443 980__ $$aEBOOK 000745443 980__ $$aBIB 000745443 982__ $$aEbook 000745443 983__ $$aOnline 000745443 994__ $$a92$$bISE