|
|
|
|
LEADER |
02648nam a2200697 4500 |
001 |
ocn871629462 |
003 |
OCoLC |
005 |
20170124071549.9 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140307s2014 enk ob 001 0 eng d |
040 |
|
|
|a CDX
|b eng
|e rda
|e pn
|c CDX
|d IDEBK
|d OCLCQ
|d DG1
|d CUS
|d N$T
|d CUS
|d YDXCP
|d OCLCQ
|d DEBSZ
|d DEBBG
|d GrThAP
|
019 |
|
|
|a 961654739
|a 962636893
|
020 |
|
|
|a 9781118898598
|q (electronic bk.)
|
020 |
|
|
|a 1118898591
|q (electronic bk.)
|
020 |
|
|
|a 1118898761
|q (electronic bk.)
|
020 |
|
|
|a 9781118898765
|q (electronic bk.)
|
020 |
|
|
|z 1848215991
|q (Cloth)
|
020 |
|
|
|z 9781848215993
|q (Cloth)
|
020 |
|
|
|z 9781306473354
|
020 |
|
|
|z 1306473357
|
029 |
1 |
|
|a NZ1
|b 15497439
|
029 |
1 |
|
|a NZ1
|b 15906680
|
029 |
1 |
|
|a CHVBK
|b 334087988
|
029 |
1 |
|
|a CHBIS
|b 010441970
|
029 |
1 |
|
|a DEBSZ
|b 406590362
|
029 |
1 |
|
|a DEBBG
|b BV043396584
|
035 |
|
|
|a (OCoLC)871629462
|z (OCoLC)961654739
|z (OCoLC)962636893
|
037 |
|
|
|a 578586
|b MIL
|
050 |
|
4 |
|a QA76.585
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/82
|2 23
|
082 |
0 |
4 |
|a 005.8
|b 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Xiong, Kaiqi,
|e author.
|
245 |
1 |
0 |
|a Resource optimization and security for cloud services /
|c Kaiqi Xiong.
|
264 |
|
1 |
|a London, UK :
|b ISTE ;
|a Hoboken, NJ :
|b Wiley,
|c 2014.
|
300 |
|
|
|a 1 online resource (xi, 194 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 181-192) and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Wiley, viewed April 4, 2014).
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
655 |
|
4 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Xiong, Kaiqi.
|t Resource optimization and security for cloud services.
|d London : ISTE Ltd ; Hoboken, NJ : John Wiley and Sons, Inc., [2014]
|z 9781848215993
|w (DLC) 2013953945
|w (OCoLC)875660143
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781118898598
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|