Handbook of research on security considerations in cloud computing
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects o...
Saved in:
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2015]
|
Subjects: | |
ISBN: | 9781466683884 1466683880 9781680158304 1680158309 9781466683877 |
Physical Description: | 1 online resource (PDFs (408 pages)) : illustrations |
LEADER | 04424cam a2200445 i 4500 | ||
---|---|---|---|
001 | kn-ocn919099449 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 150822s2015 paua fobf 001 0 eng d | ||
040 | |a IGIGL |b eng |e rda |e pn |c IGIGL |d OCLCO |d N$T |d CDX |d KNOVL |d EBLCP |d NRC |d OCLCF |d OL$ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
020 | |a 9781466683884 |q (electronic bk.) | ||
020 | |a 1466683880 |q (electronic bk.) | ||
020 | |a 9781680158304 |q (electronic bk.) | ||
020 | |a 1680158309 |q (electronic bk.) | ||
020 | |z 9781466683877 |q (print) | ||
024 | 7 | |a 10.4018/978-1-4666-8387-7 |2 doi | |
035 | |a (OCoLC)919099449 | ||
245 | 0 | 0 | |a Handbook of research on security considerations in cloud computing / |c Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2015] | |
300 | |a 1 online resource (PDFs (408 pages)) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen | |
505 | 8 | |a Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed -- Big data: an emerging field of data engineering / Piyush Kumar Shukla, Madhuvan Dixit -- Achieving efficient purging in transparent per-file secure wiping extensions / Wasim Ahmad Bhat -- Reliability, fault tolerance, and quality-of-service in cloud computing: analysing characteristics / Piyush Kumar Shukla, Gaurav Singh. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | 3 | |a "This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher. | |
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Cloud computing |x Security measures |v Handbooks, manuals, etc. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Munir, Kashif, |d 1976- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjBkyTQCBht8c8tHdQcr7b | |
700 | 1 | |a Al-Mutairi, Mubarak S., |d 1971- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjtJr6J3yxJvQ4xyjFf7wP | |
700 | 1 | |a Mohammed, Lawan Ahmed, |d 1968- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjrmTvHvt7hBK9Dx4mXxcP | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1466683872 |z 9781466683877 |w (DLC) 2015008172 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHRSCCC03/handbook-of-research?kpromoter=marc |y Full text |