LEADER 01320nam0 22003131i 450 001 SUN0022267 005 20070903120000.0 010 $a88-7078-377-4 100 $a20040827d1996 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆLa ‰mente discorsiva$fRom Harré, Grant Gillett$gedizione italiana a cura di Gioacchino Pagliaro$gcon contributi di Gaetano De Leo ... [et. al.] 210 $aMilano$cRaffaello Cortina$d1996 215 $aXIV, 295 p.$d22 cm. 410 1$1001SUN0021337$12001 $aNautilus$v20$1210 $aMilano$cRaffaello Cortina. 620 $dMilano$3SUNL000284 700 1$aHarré$b, Romano$3SUNV003279$0375547 701 1$aGillett$b, Grant$3SUNV018523$0615888 702 1$aDe Leo$b, Gaetano$3SUNV000862 702 1$aPagliaro$b, Gioacchino$3SUNV016620 712 $aCortina, Raffaello$3SUNV001491$4650 790 1$aHarré, Rom$zHarré, Romano$3SUNV003281 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0022267 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI PSICOLOGIA$d16 CONS 1177 $e16 VS 2938 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI PSICOLOGIA$bIT-CE0119$gVS$h2938$kCONS 1177$oc$qa 996 $aMente discorsiva$91432596 997 $aUNICAMPANIA LEADER 02239aam 2200433I 450 001 9910711181203321 005 20151105023937.0 024 8 $aGOVPUB-C13-07e7f83727535bdf75b39033f952fb7a 035 $a(CKB)5470000002480196 035 $a(OCoLC)927737130 035 $a(EXLCZ)995470000002480196 100 $a20151105d2011 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGuidelines on security and privacy in public cloud computing /$fW. Jansen, T. Grance 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d2011. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-144 300 $a2011. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 330 3 $aCloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and displacement of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress. This publication provides an overview of the security and privacy challenges pertinent to public cloud computing and points out considerations organizations should take when outsourcing data, applications, and infrastructure to a public cloud environment. 610 $aCloud Computing 610 $aComputer Security and Privacy 610 $aInformation Technology Outsourcing 700 $aJansen$b W$01414673 701 $aGrance$b T$01414674 701 $aJansen$b W$01414673 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711181203321 996 $aGuidelines on security and privacy in public cloud computing$93514579 997 $aUNINA