01395nam--2200433---450-99000089781020331620090909104220.088-14-01220-20089781USA010089781(ALEPH)000089781USA01008978120020123d1987----km-y0itay0103----baitaIT||||||||001yyCodice della Regione Siciliarepertorio di giurisprudenza costituzionale3. (PP 1724-2103)(primo aggiornamento al 1. giugno 1978)a cura di C. Adamo, F. Pollicino, S. VillariMilanoA. Giuffrè1987XLIII, 1663 p.20 cm2001001-------2001SiciliaLegislazione348.458ADAMO,CalogeroPOLLICINO,FilippoVILLARI,SalvatoreSicilia140974ITsalbcISBD990000897810203316XXIV.3.A 365/3 (CODEX 293/III)63936 ECXXIV.3.A 365/3 (CODEX)00245230BKGIUPATTY9020020123USA011400PATTY9020020123USA01140520020403USA011734PATRY9020040406USA011702RSIAV49020090909USA011042Codice della Regione Sicilia580112UNISA01049cam2 22002771 450 SOBE0003718720131021135621.020131021d1921 |||||ita|0103 baitaITParte primaGiovanni GentileMessinaPrincipato1921392 p.22 cmStudi filosofici9001SOBE000217612001 *Studi filosofici9001SOBE000371862001 <<3: I >>neokantiani e gli hegeliani / Giovanni GentileGentile, Giovanni <1875-1944>AF00005772070266892ITUNISOB20131021RICAUNISOBUNISOBFondo|Ortolani10498|ortSOBE00037187M 102 Monografia moderna SBNWFondo|Ortolani1|E-77.3-2modalità di consultazione sulla home page della Biblioteca link FondiNO10498|ortOrtolaniSdonocalvano123UNISOBUNISOB20131021135858.020131021140035.0calvano123Parte prima1714044UNISOB02553nam 22006611 450 991100650990332120170816130535.09781628700190162870019X978184928398418492839829781299468597129946859497818492839771849283974(CKB)2550000001019513(EBL)1186309(OCoLC)833573779(SSID)ssj0000972851(PQKBManifestationID)11948217(PQKBTitleCode)TC0000972851(PQKBWorkID)10959752(PQKB)11395056(MiAaPQ)EBC1186309(Perlego)5762(EXLCZ)99255000000101951320130221d2012 uy 0engur|n|---|||||txtccrSecuring cloud services a pragmatic approach to security architecture in the cloud /Lee NewcombeEly, Cambridgeshire :IT Governance Publishing,2012.1 online resource (329 p.)Description based upon print version of record.9781849283960 1849283966 Includes bibliographical references.Introduction to cloud computing -- Overview of existing cloud taxonomies and models -- The security balance -- Security threats associated with cloud computing --- Privacy and data security concerns -- Introduction to security architecture -- Application of security architecture to cloud computing -- Security and the cloud -- Security and infrastructure as a service -- Security and platform as a service -- Security and software as a service -- Looking ahead.This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.Cloud computingSecurity measuresComputer securityWeb servicesSecurity measuresCloud computingSecurity measures.Computer security.Web servicesSecurity measures.004.36004.6782006.78Newcombe Lee1823577MiAaPQMiAaPQMiAaPQBOOK9911006509903321Securing cloud services4390309UNINA