Book creator ( disable )
 This page cannot be added Show book (45 pages) Suggest pages

Manage your book

From LIMSWiki
Jump to navigationJump to search
Book Creator is undergoing changes

Due to severe issues with our existing system, the Book Creator will no longer support saving a book as a PDF.

Download single pages

While the Book Creator PDF rendering is disabled, you can try Download as PDF from the sidebar tools for individual articles.

Update
  • Remove 1. Introduction to Cloud Computing
  • Remove Show Cloud computing
  • Remove Show IEEE Cloud Computing
  • Remove Show Service-level agreement
  • Remove 2. Regulatory Compliance and Standards
  • Remove Show Legal aspects of computing
  • Remove Show Children's Online Privacy Protection Act
  • Remove Show Federal Information Security Management Act of 2002
  • Remove Show FedRAMP
  • Remove Show Gramm–Leach–Bliley Act
  • Remove Show Health Information Technology for Economic and Clinical Health Act
  • Remove Show Health Insurance Portability and Accountability Act
  • Remove Show Sarbanes–Oxley Act
  • Remove Show Data Protection Directive
  • Remove Show General Data Protection Regulation
  • Remove Show AS 8015
  • Remove Show COBIT
  • Remove Show Corporate governance of information technology
  • Remove Show Corporate Governance of ICT
  • Remove Show ISO/IEC 27000
  • Remove Show ISO/IEC 38500
  • Remove Show Payment Card Industry Data Security Standard
  • Remove 3. Security
  • Remove Show Security
  • Remove Show Computer security
  • Remove Show Network security
  • Remove Show Information security
  • Remove Show Cloud computing security
  • Remove Show Security as a service
  • Remove Show Attribute-based encryption
  • Remove Show Bring your own encryption
  • Remove Show Digital transaction management
  • Remove Show Homomorphic encryption
  • Remove Show Key distribution
  • Remove Show Secret sharing
  • Remove Show Audit trail
  • Remove Show Vulnerability management
  • Remove Show Information security management
  • Remove Show Information technology security audit
  • Remove Show IT Baseline Protection Catalogs
  • Remove Show Business continuity planning
  • Remove Show Data recovery
  • Remove Show Cloud Security Alliance
  • Remove 4. Risk Management
  • Remove Show IT risk management
  • Remove Show Risk IT
  • Remove Show Incident management
  • Remove Show Penetration test
  • Remove Show Defensive computing
Enter name for new chapter Enter new name for chapter Do you really want to completely clear your book?

Order as a printed book

Get a printed book from our print-on-demand partner.

Download

To download your book choose a format and click the button.