語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on security con...
~
Al-Mutairi, Mubarak S., (1971-)
Handbook of research on security considerations in cloud computing /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Handbook of research on security considerations in cloud computing /Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors.
其他作者:
Munir, Kashif,
面頁冊數:
PDFs (408 pages) :illustrations.
標題:
Cloud computingCongresses.Security measures
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
ISBN:
9781466683884 (ebook)
Handbook of research on security considerations in cloud computing /
Handbook of research on security considerations in cloud computing /
Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. - PDFs (408 pages) :illustrations.
Includes bibliographical references and index.
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen --
Restricted to subscribers or individual electronic text purchasers.
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466683884 (ebook)
Standard No.: 10.4018/978-1-4666-8387-7doi
LCCN: 2015008172Subjects--Topical Terms:
715587
Cloud computing
--Security measures--Congresses.Subjects--Index Terms:
Big data security
LC Class. No.: QA76.585 / .H3646 2015e
Dewey Class. No.: 004.67/82
Handbook of research on security considerations in cloud computing /
LDR
:04098nmm a2200481 i 4500
001
464574
003
IGIG
005
20150824123847.0
008
151130s2015 paua fob 001 0 eng d
010
$a
2015008172
020
$a
9781466683884 (ebook)
020
$a
9781466683877$qprint
024
7
$a
10.4018/978-1-4666-8387-7
$2
doi
035
$a
(CaBNVSL)gtp00563540
035
$a
(OCoLC)919099449
035
$a
00000263
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.585
$b
.H3646 2015e
082
0 4
$a
004.67/82
$2
23
245
0 0
$a
Handbook of research on security considerations in cloud computing /
$c
Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
$b
IGI Global,
$c
[2015]
300
$a
PDFs (408 pages) :
$b
illustrations.
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen --
505
8
$a
Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed -- Big data: an emerging field of data engineering / Piyush Kumar Shukla, Madhuvan Dixit -- Achieving efficient purging in transparent per-file secure wiping extensions / Wasim Ahmad Bhat -- Reliability, fault tolerance, and quality-of-service in cloud computing: analysing characteristics / Piyush Kumar Shukla, Gaurav Singh.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Cloud computing
$x
Security measures
$v
Congresses.
$3
715587
653
$a
Big data security
653
$a
Data engineering
653
$a
Fuzzy logic in cloud computing
653
$a
Governance and risk management in the cloud
653
$a
Multicloud architecture
653
$a
Networked multimedia communication systems
653
$a
Quality-of-service in cloud computing
653
$a
Secure wiping extensions
653
$a
Security using data mining techniques
700
1
$a
Munir, Kashif,
$d
1976-
$e
editor.
$3
717994
700
1
$a
Al-Mutairi, Mubarak S.,
$d
1971-
$e
editor.
$3
717995
700
1
$a
Mohammed, Lawan Ahmed,
$d
1968-
$e
editor.
$3
717996
710
2
$a
IGI Global,
$e
publisher.
$3
717658
776
0
$c
(Original)
$w
(DLC)2015008172
776
0 8
$i
Print version:
$z
1466683872
$z
9781466683877
$w
(DLC) 2015008172
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000113596
電子館藏
1圖書
電子書
EB QA76.585 H3646 c2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8387-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入