Autoren: |
Piotr
Czerwonka
Uniwersytet Łódzki Łukasz Zakonnik Uniwersytet Łódzki |
Schlüsselbegriffe: | chmura obliczeniowa open source bezpieczeństwo |
Veröffentlichungsdatum der gesamten Ausgabe: | 2016 |
Seitenanzahl: | 9 (193-201) |
1. | (July 2015), 2015 Top Markets Report Cloud Computing, A Market Assessment Tool for U.S. Exporters, http://trade.gov/topmarkets/pdf/ Cloud_Computing_ |
2. | Top_Markets_Report.pdf. |
3. | Columbus, L. (2014), IDC Predicts SaaS Enterprise Applications Will Be A $50.8B Market By 2018, http://www.forbes.com/sites/louiscolumbus/2014/ 12/20/idc-predicts-saas-enterprise-applications-will-be-a-50-8b-market-by-2018. |
4. | Czerwonka P., Zakonnik Ł., Ewolucja i perspektywy rozwoju prywatnych chmur obli-czeniowych. Mity i fakty, „Przedsiębiorczość i Zarządzanie”, 16(9) (w druku). |
5. | Fagerland S., Grance W. (2015), The Inception framework: Cloud Hosted APT, https://www.bluecoat.com/security-blog/2014-12-09/blue-coat-exposes-%E2% |
6. | 80%9C-inception-framework%E2%80%9D-very-sophisticated-layered-malware. |
7. | Florian C. (2014), Most vulnerable operating systems and applications in 2014, http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/. |
8. | Meulen R., Rivera J. (2014), Gartner Highlights the Top 10 Cloud Myths, http://www.gartner.com/newsroom/id/2889217. |
9. | Prysmakou A. (2015), Cloud Foundry Security Overview, http://events. |
10. | linuxfoundation.org/sites/events/files/slides/CFSummit_Security.pdf. |
11. | Reed A., Rezek C., Simmonds P. (2011), Security guidance for critical areas of focus in cloud computing V3.0, https://cloudsecurityalliance.org/download/ |
12. | security-guidance-for-critical-areas-of-focus-in-cloud-computing-v3/. |
13. | Rovelli P. (2015), Don’t believe these four myths about Linux security, https://blogs.sophos.com/2015/03/26/dont-believe-these-four-myths-about-linux-security/. |
14. | State of cloud security report, AlertLogic 2014, https://www.alertlogic.com/ |
15. | resources/cloud-security-report-2014. |
16. | State of cloud security report, AlertLogic 2010, https://www.alertlogic.com/ |
17. | resources/cloud-security-report-2010 |
18. | Weins K. (2015), Cloud Computing Trends: 2015 State of the Cloud Survey, http://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2015-state-cloud-survey. |
19. | Wyrok Trybunału Sprawiedliwości Unii Europejskiej z dnia 6 października 2015 roku, http://curia.europa.eu/juris/document/document.jsf?text=&docid= 169195& |
20. | pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=125031. |