Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.
After clicking on a citation below, enter your myWalden user name and password at the prompt.
Please Ask a Librarian if you have any questions about the links.
Creeger, M. (2009). CTO Roundtable: Cloud Computing. Communications of the ACM, 52(8), 50-56.
Deka, G. (2014). A survey of cloud database systems. IT Professional, 16(2).
Fortinova, J. (2013). Risks of cloud computing. Systémová Integrace, 20(3), 63–73.
Green, M. (2013). The Threat in the Cloud. IEEE Security & Privacy, 11(1), 86–89.
Han, Y. (2011). Cloud computing: Case studies and total costs of ownership. Information Technology & Libraries, 30(4), 198–206.
Mell, P. (2012). What’s special about cloud security? IT Professional Magazine, 14(4), 6–8.
Nanavati, M., Colp, P., Aiello, B., & Warfield, A. (2014). Cloud security: A gathering storm. Communications of the ACM, 57(5), 70–79.
Weiss, A. (2007). Computing in the clouds. netWorker, 11(4), 16–25.
Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.
If you have questions about your required course textbooks, please contact Customer Care at email@example.com