00805cam0 22002413 450 SOB02230820210729100757.020040211d1950 |||||ita|0103 baengUKCollected PoemsRobert Louis StevensonEdited, with an Introduction and Notes, by Janet Adam SmithLondonRupert Hart-Davis1950572 p.21 cmStevenson, Robert_LouisAF000136650707383ITUNISOB20210729RICAUNISOBUNISOB820112100SOB022308M 102 Monografia moderna SBNM820002395SI112100dono CorradoAlfanoUNISOBUNISOB20150603100210.020150603100245.0AlfanoCollected Poems442401UNISOB01130nam a2200277 i 4500991004032109707536030303s1995 it 000 0 ita b11901391-39ule_instBiblioteca InterfacoltàitaIta851.508Il barocco, Marino e la poesia del Seicento/scelta e introduzione di Marzio Pieri.Roma :Istituto poligrafico e Zecca dello Stato,c1995.xxvi, 1066 p. ;29cm.Cento libri per mille anni.Ed. di 3000 esempl. num.Include referenze bibliografiche.Poesia italianaSec. 17.Antologie.Pieri, Marzio.authorhttp://id.loc.gov/vocabulary/relators/aut158669.b1190139128-04-1703-03-03991004032109707536LE002 800 Coll. 1LE002 Enc.Lett.It. 20.03412002000150554le002V. 34-E0.00-no 00000.i1216442203-03-03Barocco, Marino e la poesia del Seicento1454883UNISALENTOle00203-03-03ma -itait 3104187nam 2200697 a 450 991013962940332120170815150153.01-118-11604-61-283-17726-997866131772611-118-26909-81-118-11602-X(CKB)2550000000041667(EBL)697627(SSID)ssj0000534232(PQKBManifestationID)11329775(PQKBTitleCode)TC0000534232(PQKBWorkID)10492864(PQKB)10264502(MiAaPQ)EBC697627(OCoLC)747412460(CaSebORM)9781118116043(PPN)18941734X(EXLCZ)99255000000004166720110418d2011 uy 0engur|n|---|||||txtccrAuditing cloud computing[electronic resource] a security and privacy guide /[edited by] Ben Halpert1st editionHoboken, N.J. John Wiley & Sonsc20111 online resource (224 p.)Wiley corporate F & A ;21Description based upon print version of record.0-470-87474-0 Includes bibliographical references and index.AUDITING CLOUD COMPUTING: A Security and Privacy Guide; Contents; Preface; Chapter 1: Introduction to Cloud Computing; Chapter 2: Cloud-Based IT Audit Process; Chapter 3: Cloud-Based IT Governance; Chapter 4: System and Infrastructure Lifecycle Management for the Cloud; Chapter 5: Cloud-Based IT Service Delivery and Support; Chapter 6: Protection and Privacy of Information Assets in the Cloud; Chapter 7: Business Continuity and Disaster Recovery; Chapter 8: Global Regulation and Cloud Computing; Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and AuditAppendix: Cloud Computing Audit ChecklistAbout the Editor; About the Contributors; Index"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"--Provided by publisher.Wiley corporate F & A ;21.Business enterprisesComputer networksSecurity measuresCloud computingSecurity measuresInformation technologySecurity measuresData protectionBusiness enterprisesComputer networksSecurity measures.Cloud computingSecurity measures.Information technologySecurity measures.Data protection.005.8BUS003000bisacshHalpert Ben888177Halpert Ben1986-888177MiAaPQMiAaPQMiAaPQBOOK9910139629403321Auditing cloud computing1984042UNINA01103cam0-22003251i-450 99000462207040332120250422110912.0(Aleph)000462207FED0119990604g19481961km-y0itay50------bafreFRy-------001yyMemoiresSain-Simontexte établi et annoté par Gonzague TrucParisGallimard1948-19617 v.18 cmBibliothèque de la Pléiade1.: année 1691-17012.: année 1702-17083.: année 1709-17124.: année 1712 (suite)-17155.: année 1715 (suite)-17186.: année 1718 (suite)-17217.: année 1722-1723335.2211 rid.itaSaint-Simon,Claude-Henri de Rouvroy<1760-1825>126206Truc,Gonzague<1877-1972>ITUNINARICAUNIMARCBK990004622070403321XI CL S 2 - 2(6)DFD840.8 BIBPLE 69FLFBC840.8 BIBPLE 77FLFBCDFDFLFBCMémoires212739UNINA