Trust in computer systems and the cloud / (Record no. 257173)
000 -LEADER | |
---|---|
fixed length control field | 03250nam a2200337 i 4500 |
001 - CONTROL NUMBER | |
control field | 257173 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | TH-BaBU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250302083702.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 211109s2022 nju fob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DG1 |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | TH-BaBU |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119693017 (electronic bk.) |
International Standard Book Number | 9781119692317 (electronic bk.) |
International Standard Book Number | 9781119692324 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | B877T 2022 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bursell, Mike, |
Relator term | author. |
9 (RLIN) | 167449 |
245 10 - TITLE STATEMENT | |
Title | Trust in computer systems and the cloud / |
Statement of responsibility, etc. | Mike Bursell. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | ©2022 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Front Matter -- Why Trust? -- Humans and Trust -- Trust Operations and Alternatives -- Defining Trust in Computing -- The Importance of Systems -- Blockchain and Trust -- The Importance of Time -- Systems and Trust -- Open Source and Trust -- Trust, the Cloud, and the Edge -- Hardware, Trust, and Confidential Computing -- Trust Domains -- A World of Explicit Trust -- References -- Index |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell's experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master's students in software architecture and security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
Topical term or geographic name entry element | Cloud computing |
General subdivision | Security measures. |
9 (RLIN) | 167450 |
856 41 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3075945">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3075945</a> |
Public note | Electronic Resources |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | E-Book |
No items available.