Description |
1 online resource (463 pages) |
Contents |
Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Author; Prologue: An Introduction; 1: Singularized Plurality; 2: Present Absence; 3: Universal Particulars; 4: Beginning Ending; 5: Manual Automatons; 6: Control Chaos; 7: Uninvited Guests; 8: Known Unknowns; 9: Lost and Found; 10: Other Selves; 11: Transfigured Relations; Epilogue: Three Acts; Index |
Summary |
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design |
Notes |
Print version record |
Subject |
Cloud computing.
|
|
Mobile computing.
|
|
COMPUTERS -- Security -- General.
|
|
COMPUTERS -- Internet -- General.
|
|
Cloud computing.
|
|
Mobile computing.
|
Form |
Electronic book
|
ISBN |
9780429807367 |
|
0429807368 |
|
9780429807350 |
|
042980735X |
|