Display title | Cloud computing security |
Default sort key | Cloud computing security |
Page length (in bytes) | 54,143 |
Namespace ID | 0 |
Page ID | 25619904 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of page watchers | 98 |
Number of page watchers who visited in the last 30 days | 7 |
Number of redirects to this page | 7 |
Counted as a content page | Yes |
Wikidata item ID | Q370563 |
Local description | Methods used to protect cloud based assets |
Central description | broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing |
Page views in the past 30 days | |
Edit | Allow all users (no expiry set) |
Move | Allow all users (no expiry set) |
Page creator | Amoorthy (talk | contribs) |
Date of page creation | 04:14, 31 December 2009 |
Latest editor | OAbot (talk | contribs) |
Date of latest edit | 06:52, 7 April 2025 |
Total number of edits | 636 |
Recent number of edits (within past 30 days) | 0 |
Recent number of distinct authors | 0 |
Hidden categories (5) | This page is a member of 5 hidden categories (help):
|
Transcluded templates (76) | Pages transcluded onto the current version of this page (help):
|
Wikidata entities used in this page | |