Security management in mobile cloud computing
"This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms"--Resumé vydavatele
Saved in:
| Other Authors | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hershey, PA :
Information Science Reference,
[2017]
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781522506034 |
| Physical Description | 1 online zdroj. |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 91123 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008101011.0 | ||
| 006 | m o d | ||
| 007 | cr |n | ||
| 008 | 160809s2017 pau fo 001 0 eng d | ||
| 999 | |c 91123 |d 91123 | ||
| 020 | |a 9781522506034 |q (ebook) | ||
| 035 | |a (OCoLC)956376975 | ||
| 040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d IDEBK |d VT2 |d AJB |d UIU |d OCLCQ |d OCLCF | ||
| 072 | 7 | |a 004.7 |x Počítačové sítě |2 Konspekt |9 23 | |
| 080 | |a 004.771 |2 MRF | ||
| 080 | |a 004.7 |2 MRF | ||
| 080 | |a 004.7.056 |2 MRF | ||
| 080 | |a 351.759:[001.102+004] |2 MRF | ||
| 080 | |a (048.8:082) |2 MRF | ||
| 080 | |a (0.034.2:08) |2 MRF | ||
| 245 | 0 | 0 | |a Security management in mobile cloud computing / |c [edited by] Kashif Munir. |
| 264 | 1 | |a Hershey, PA : |b Information Science Reference, |c [2017] | |
| 264 | 4 | |c ©2017 | |
| 300 | |a 1 online zdroj. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 504 | |a Obsahuje bibliografické odkazy a index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
| 520 | |a "This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms"--Resumé vydavatele | ||
| 588 | 0 | |a Description based on online resource; title from PDF title page (EBSCO, viewed August 10, 2016). | |
| 590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
| 650 | 0 | 7 | |a cloud computing |7 ph579331 |2 czenas |
| 650 | 0 | 7 | |a počítačové sítě |7 ph115867 |2 czenas |
| 650 | 0 | 7 | |a zabezpečení počítačových sítí |7 ph127513 |2 czenas |
| 650 | 0 | 7 | |a informační bezpečnost |7 ph136652 |2 czenas |
| 650 | 0 | 9 | |a cloud computing |2 eczenas |
| 650 | 0 | 9 | |a computer networks |2 eczenas |
| 650 | 0 | 9 | |a computer network security |2 eczenas |
| 650 | 0 | 9 | |a information security |2 eczenas |
| 655 | 7 | |a kolektivní monografie |7 fd501537 |2 czenas | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a collective monographs |2 eczenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Munir, Kashif, |d 1976- |e editor. | |
| 856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1331593&authtype=ip,shib&custid=s3936755 |
| 942 | |2 udc | ||
| 992 | |c EBOOK-TN |c EBSCO | ||
| 993 | |x NEPOSILAT |y EIZ | ||