LEADER 04187nam 2200697 a 450 001 9910139629403321 005 20170815150153.0 010 $a1-118-11604-6 010 $a1-283-17726-9 010 $a9786613177261 010 $a1-118-26909-8 010 $a1-118-11602-X 035 $a(CKB)2550000000041667 035 $a(EBL)697627 035 $a(SSID)ssj0000534232 035 $a(PQKBManifestationID)11329775 035 $a(PQKBTitleCode)TC0000534232 035 $a(PQKBWorkID)10492864 035 $a(PQKB)10264502 035 $a(MiAaPQ)EBC697627 035 $a(OCoLC)747412460 035 $a(CaSebORM)9781118116043 035 $a(PPN)18941734X 035 $a(EXLCZ)992550000000041667 100 $a20110418d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAuditing cloud computing$b[electronic resource] $ea security and privacy guide /$f[edited by] Ben Halpert 205 $a1st edition 210 $aHoboken, N.J. $cJohn Wiley & Sons$dc2011 215 $a1 online resource (224 p.) 225 1 $aWiley corporate F & A ;$v21 300 $aDescription based upon print version of record. 311 $a0-470-87474-0 320 $aIncludes bibliographical references and index. 327 $aAUDITING CLOUD COMPUTING: A Security and Privacy Guide; Contents; Preface; Chapter 1: Introduction to Cloud Computing; Chapter 2: Cloud-Based IT Audit Process; Chapter 3: Cloud-Based IT Governance; Chapter 4: System and Infrastructure Lifecycle Management for the Cloud; Chapter 5: Cloud-Based IT Service Delivery and Support; Chapter 6: Protection and Privacy of Information Assets in the Cloud; Chapter 7: Business Continuity and Disaster Recovery; Chapter 8: Global Regulation and Cloud Computing; Chapter 9: Cloud Morphing: Shaping the Future of Cloud Computing Security and Audit 327 $aAppendix: Cloud Computing Audit ChecklistAbout the Editor; About the Contributors; Index 330 $a"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of cloud computing--utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the "cloud." Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources. Reveals effective methods for evaluating the security and privacy practices of cloud services. A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA). Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers"--$cProvided by publisher. 410 0$aWiley corporate F & A ;$v21. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aCloud computing$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aData protection 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aCloud computing$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aData protection. 676 $a005.8 686 $aBUS003000$2bisacsh 700 $aHalpert$b Ben$0888177 701 $aHalpert$b Ben$f1986-$0888177 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910139629403321 996 $aAuditing cloud computing$91984042 997 $aUNINA