Handbook of research on security considerations in cloud computing
Saved in:
| Other Authors | , , |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2015]
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781466683884 1466683880 9781680158304 1680158309 9781466683877 |
| Physical Description | 1 online resource (PDFs (408 pages)) : illustrations |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | kn-ocn919099449 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 150822s2015 paua fobf 001 0 eng d | ||
| 040 | |a IGIGL |b eng |e rda |e pn |c IGIGL |d OCLCO |d N$T |d CDX |d KNOVL |d EBLCP |d NRC |d OCLCF |d OL$ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
| 020 | |a 9781466683884 |q (electronic bk.) | ||
| 020 | |a 1466683880 |q (electronic bk.) | ||
| 020 | |a 9781680158304 |q (electronic bk.) | ||
| 020 | |a 1680158309 |q (electronic bk.) | ||
| 020 | |z 9781466683877 |q (print) | ||
| 024 | 7 | |a 10.4018/978-1-4666-8387-7 |2 doi | |
| 035 | |a (OCoLC)919099449 | ||
| 245 | 0 | 0 | |a Handbook of research on security considerations in cloud computing / |c Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors. |
| 264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2015] | |
| 300 | |a 1 online resource (PDFs (408 pages)) : |b illustrations | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a electronic |2 isbdmedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Security issues in cloud computing / Subhash Chandra Patel, R.S. Singh, Sumit Jaiswal -- Cloud computing security: abuse and nefarious use of cloud computing / Marwan Omar -- Cloud security using ear biometrics / Santosh Kumar, Ali Imam Abidi, Sanjay Kumar Singh -- Secure architecture for cloud environment / Kashif Munir, Sellapan Palaniappan -- Governance and risk management in the cloud with cloud controls Matrix V3 and ISO/IEC 38500:2008 / Abhik Chaudhuri -- Authentication and error resilience in images transmitted through open environment / Qurban A Memon -- Trust calculation using fuzzy logic in cloud computing / Rajanpreet Kaur Chahal, Sarbjeet Singh -- Advances in information, security, privacy & ethics: use of cloud computing for education / Joseph M. Woodside -- Networked multimedia communication systems / Piyush Kumar Shukla, Kirti Raj Bhatele -- Data security issues and solutions in cloud computing / Abhishek Majumder, Sudipta Roy, Satarupa Biswas -- Improving privacy and security in multicloud architectures / Piyush Kumar Shukla, Mahendra Kumar Ahirwar -- Hard clues in soft environments: the cloud's influence on digital forensics / Andrea Atzeni, Paolo Smiraglia, Andrea Siringo -- Security challenges for cloud computing development framework in Saudi Arabia / Lawan A. Mohammed, Kashif Munir -- Big data security: challenges, recommendations and solutions / Fatima-Zahra Benjelloun, Ayoub Ait Lahcen | |
| 505 | 8 | |a Access control framework for cloud computing / Kashif Munir, Lawan A. Mohammed -- Big data: an emerging field of data engineering / Piyush Kumar Shukla, Madhuvan Dixit -- Achieving efficient purging in transparent per-file secure wiping extensions / Wasim Ahmad Bhat -- Reliability, fault tolerance, and quality-of-service in cloud computing: analysing characteristics / Piyush Kumar Shukla, Gaurav Singh. | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | 3 | |a "This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs"--Provided by publisher. | |
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Cloud computing |x Security measures |v Handbooks, manuals, etc. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Munir, Kashif, |d 1976- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjBkyTQCBht8c8tHdQcr7b | |
| 700 | 1 | |a Al-Mutairi, Mubarak S., |d 1971- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjtJr6J3yxJvQ4xyjFf7wP | |
| 700 | 1 | |a Mohammed, Lawan Ahmed, |d 1968- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjrmTvHvt7hBK9Dx4mXxcP | |
| 710 | 2 | |a IGI Global, |e publisher. | |
| 776 | 0 | 8 | |i Print version: |z 1466683872 |z 9781466683877 |w (DLC) 2015008172 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHRSCCC03/handbook-of-research?kpromoter=marc |y Full text |