_version_ 1809900719923265536
annif_keywords_txtF_mv strategies cloud services enterprises corporate strategies leadership (activity)
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p4632 http://www.yso.fi/onto/yso/p24167 http://www.yso.fi/onto/yso/p3128 http://www.yso.fi/onto/yso/p5156 http://www.yso.fi/onto/yso/p554
author Jolkkonen, Tomi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietotekniikka Mathematical Information Technology 602
author_facet Jolkkonen, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Tietotekniikka Mathematical Information Technology 602 Jolkkonen, Tomi
author_sort Jolkkonen, Tomi
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2022-02-02T21:03:36Z
format Pro gradu
format_ext_str_mv Opinnäyte Pro gradu
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Cloud Asset Identification Strategy</title><creator>Jolkkonen, Tomi</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Tietotekniikka</contributor><contributor type="oppiaine" lang="en">Mathematical Information Technology</contributor><contributor type="oppiainekoodi">602</contributor><subject type="other">Cloud</subject><subject type="other">IP identification</subject><subject type="other">Asset</subject><subject type="other">Dark Web</subject><subject type="other">Vulnerabilities</subject><subject type="yso">kyberturvallisuus</subject><subject type="yso">esineiden internet</subject><subject type="yso">pilvipalvelut</subject><subject type="yso">tietoturva</subject><subject type="yso">tietosuoja</subject><subject type="yso">cyber security</subject><subject type="yso">Internet of things</subject><subject type="yso">cloud services</subject><subject type="yso">data security</subject><subject type="yso">data protection</subject><available>2022-02-02T10:54:28Z</available><issued>2022</issued><type lang="fi">Pro gradu -tutkielma</type><type lang="en">Master&#x2019;s thesis</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/79613</identifier><identifier type="urn">URN:NBN:fi:jyu-202202021373</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202202021373</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/79613/1/URN%3aNBN%3afi%3ajyu-202202021373.pdf" name="URN:NBN:fi:jyu-202202021373.pdf" type="application/pdf" length="1517702" sequence="1"/><recordID>123456789_79613</recordID></qualifieddc>
id jyx.123456789_79613
language eng
last_indexed 2024-09-03T10:52:46Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/79613\/1\/URN%3aNBN%3afi%3ajyu-202202021373.pdf","text":"URN:NBN:fi:jyu-202202021373.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 602
publication_first_indexed 2022-02-02T21:03:36Z
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Jolkkonen, Tomi Cloud Asset Identification Strategy Cloud IP identification Asset Dark Web Vulnerabilities kyberturvallisuus esineiden internet pilvipalvelut tietoturva tietosuoja cyber security Internet of things cloud services data security data protection
subject_txtF Tietotekniikka
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_79613&index=0&size=large
title Cloud Asset Identification Strategy
title_full Cloud Asset Identification Strategy
title_fullStr Cloud Asset Identification Strategy Cloud Asset Identification Strategy
title_full_unstemmed Cloud Asset Identification Strategy Cloud Asset Identification Strategy
title_short Cloud Asset Identification Strategy
title_sort cloud asset identification strategy
title_txtP Cloud Asset Identification Strategy
topic Cloud IP identification Asset Dark Web Vulnerabilities kyberturvallisuus esineiden internet pilvipalvelut tietoturva tietosuoja cyber security Internet of things cloud services data security data protection
topic_facet Asset Cloud Dark Web IP identification Internet of things Vulnerabilities cloud services cyber security data protection data security esineiden internet kyberturvallisuus pilvipalvelut tietosuoja tietoturva
url https://jyx.jyu.fi/handle/123456789/79613 http://www.urn.fi/URN:NBN:fi:jyu-202202021373
work_keys_str_mv AT jolkkonentomi cloudassetidentificationstrategy