Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Handbook of research on security con...
~
Al-Mutairi, Mubarak S., (1971-)
Handbook of research on security considerations in cloud computing /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Handbook of research on security considerations in cloud computing /Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors.
other author:
Munir, Kashif,
Description:
PDFs (408 pages) :illustrations.
Subject:
Cloud computingCongresses.Security measures
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
ISBN:
9781466683884 (ebook)
Handbook of research on security considerations in cloud computing /
Handbook of research on security considerations in cloud computing /
Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. - PDFs (408 pages) :illustrations.
Includes bibliographical references and index.
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen --
Restricted to subscribers or individual electronic text purchasers.
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466683884 (ebook)
Standard No.: 10.4018/978-1-4666-8387-7doi
LCCN: 2015008172Subjects--Topical Terms:
715587
Cloud computing
--Security measures--Congresses.Subjects--Index Terms:
Big data security
LC Class. No.: QA76.585 / .H3646 2015e
Dewey Class. No.: 004.67/82
Handbook of research on security considerations in cloud computing /
LDR
:04098nmm a2200481 i 4500
001
464574
003
IGIG
005
20150824123847.0
008
151130s2015 paua fob 001 0 eng d
010
$a
2015008172
020
$a
9781466683884 (ebook)
020
$a
9781466683877$qprint
024
7
$a
10.4018/978-1-4666-8387-7
$2
doi
035
$a
(CaBNVSL)gtp00563540
035
$a
(OCoLC)919099449
035
$a
00000263
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.585
$b
.H3646 2015e
082
0 4
$a
004.67/82
$2
23
245
0 0
$a
Handbook of research on security considerations in cloud computing /
$c
Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
$b
IGI Global,
$c
[2015]
300
$a
PDFs (408 pages) :
$b
illustrations.
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen --
505
8
$a
Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed -- Big data: an emerging field of data engineering / Piyush Kumar Shukla, Madhuvan Dixit -- Achieving efficient purging in transparent per-file secure wiping extensions / Wasim Ahmad Bhat -- Reliability, fault tolerance, and quality-of-service in cloud computing: analysing characteristics / Piyush Kumar Shukla, Gaurav Singh.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Cloud computing
$x
Security measures
$v
Congresses.
$3
715587
653
$a
Big data security
653
$a
Data engineering
653
$a
Fuzzy logic in cloud computing
653
$a
Governance and risk management in the cloud
653
$a
Multicloud architecture
653
$a
Networked multimedia communication systems
653
$a
Quality-of-service in cloud computing
653
$a
Secure wiping extensions
653
$a
Security using data mining techniques
700
1
$a
Munir, Kashif,
$d
1976-
$e
editor.
$3
717994
700
1
$a
Al-Mutairi, Mubarak S.,
$d
1971-
$e
editor.
$3
717995
700
1
$a
Mohammed, Lawan Ahmed,
$d
1968-
$e
editor.
$3
717996
710
2
$a
IGI Global,
$e
publisher.
$3
717658
776
0
$c
(Original)
$w
(DLC)2015008172
776
0 8
$i
Print version:
$z
1466683872
$z
9781466683877
$w
(DLC) 2015008172
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000113596
電子館藏
1圖書
電子書
EB QA76.585 H3646 c2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login