語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on security con...
~
Munir, Kashif (1976-)
Handbook of research on security considerations in cloud computing
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
MohammedLawan Ahmed, 1968-
其他作者:
Al-MutairiMubarak S., 1971-
其他作者:
MunirKashif, 1976-
其他團體作者:
IGI Global
面頁冊數:
PDFs (408 pages)illustrations. :
標題:
Cloud computing - Security measures -
標題:
Big data security
標題:
Data engineering
標題:
Fuzzy logic in cloud computing
標題:
Governance and risk management in the cloud
標題:
Multicloud architecture
標題:
Networked multimedia communication systems
標題:
Quality-of-service in cloud computing
標題:
Secure wiping extensions
標題:
Security using data mining techniques
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
附註:
Content Type: text
摘要註:
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
ISBN:
9781466683884
內容註:
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri Authentication and error resilience in images transmitted through open environment / Qurban A Memon Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed Big data: an emer Restricted to subscribers or individual electronic text purchasers.
Handbook of research on security considerations in cloud computing
Handbook of research on security considerations in cloud computing
/ Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. - PDFs (408 pages) ; illustrations..
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal.
Content Type: textMedia type: electronicCarrier type: online resource.
Includes bibliographical references and index..
ISBN 9781466683884ISBN 9781466683877
Cloud computing -- Security measures
Big data securityData engineeringFuzzy logic in cloud computingGovernance and risk management in the cloudMulticloud architectureNetworked multimedia communication systemsQuality-of-service in cloud computingSecure wiping extensionsSecurity using data mining techniques
Mohammed, Lawan Ahmed
Handbook of research on security considerations in cloud computing
LDR
:03636nam a2200457 450
001
288694
005
20150824123847.0
009
a(CaBNVSL)gtp00563540
009
a(OCoLC)919099449
009
00000263
010
1
$a
9781466683884
$b
ebook
010
1
$a
9781466683877
012
0
$a
10.4018/978-1-4666-8387-7
020
$b
2015008172
100
$a
20151127d2015 y0engy50 b
102
$a
us
105
$a
a a 001yy
200
1
$a
Handbook of research on security considerations in cloud computing
$f
Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors.
215
1
$a
PDFs (408 pages)
$c
illustrations.
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
301
$a
10.4018/978-1-4666-8387-7
310
$a
Also available in print.
320
$a
Includes bibliographical references and index.
327
1
$a
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal
$a
Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar
$a
Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh
$a
Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan
$a
Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri
$a
Authentication and error resilience in images transmitted through open environment / Qurban A Memon
$a
Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh
$a
Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside
$a
Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele
$a
Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas
$a
Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar
$a
Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo
$a
Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir
$a
Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen
$a
Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed
$a
Big data: an emer
$a
Restricted to subscribers or individual electronic text purchasers.
330
$a
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2015008172
452
1
$1
300
$a
Print version:
$1
001(DLC) 2015008172
$1
0101
$a
1466683872; 9781466683877
606
$a
Cloud computing
$x
Security measures
$x
Handbooks, manuals, etc.
$2
lc
$3
385232
610
1
$a
Big data security
610
1
$a
Data engineering
610
1
$a
Fuzzy logic in cloud computing
610
1
$a
Governance and risk management in the cloud
610
1
$a
Multicloud architecture
610
1
$a
Networked multimedia communication systems
610
1
$a
Quality-of-service in cloud computing
610
1
$a
Secure wiping extensions
610
1
$a
Security using data mining techniques
676
$a
004.67/82
$v
23
680
$a
QA76.585
$b
.H3646 2015e
702
1
$a
Mohammed
$b
Lawan Ahmed
$f
1968-
$4
editor.
$3
385231
702
1
$a
Al-Mutairi
$b
Mubarak S.
$f
1971-
$4
editor.
$3
385230
702
1
$a
Munir
$b
Kashif
$f
1976-
$4
editor.
$3
385229
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入