Preeti Mishra (Graphic Era Univ. Uttarakhand), Emmanuel S Pilli (MNIT Jaipur), R C Joshi (Graphic Era Uni. Uttarakhand)
Cloud Security
Attacks, Techniques, Tools, and Challenges
Preeti Mishra (Graphic Era Univ. Uttarakhand), Emmanuel S Pilli (MNIT Jaipur), R C Joshi (Graphic Era Uni. Uttarakhand)
Cloud Security
Attacks, Techniques, Tools, and Challenges
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud deployment models, key technologies, service platforms and challenges.
Andere Kunden interessierten sich auch für
- Privacy and Security Challenges in Cloud Computing159,99 €
- Security and Privacy Trends in Cloud Computing and Big Data71,99 €
- Mukesh ChoudharyMastering Honeypots45,99 €
- K. ChandrasekaranEssentials of Cloud Computing172,99 €
- Security Analytics127,99 €
- Ted CoombsCloud Security for Dummies30,99 €
- Sunilkumar ManviCloud Computing70,99 €
-
-
-
This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud deployment models, key technologies, service platforms and challenges.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 216
- Erscheinungstermin: 28. Dezember 2021
- Englisch
- Abmessung: 161mm x 241mm x 22mm
- Gewicht: 524g
- ISBN-13: 9780367435820
- ISBN-10: 0367435829
- Artikelnr.: 62571403
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 216
- Erscheinungstermin: 28. Dezember 2021
- Englisch
- Abmessung: 161mm x 241mm x 22mm
- Gewicht: 524g
- ISBN-13: 9780367435820
- ISBN-10: 0367435829
- Artikelnr.: 62571403
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Preeti Mishra is currently working as an Assistant Professor in the Department of Computer Science in Doon University, Dehradun, UK, India which is a State Government University. Earlier, she was associated with Graphic Era Deemed to be University Dehradun. She has 10+ years teaching and research experience. She received her Ph. D. degree in the field of Cloud Security from Malaviya National Institute of Technology Jaipur, India under the supervision of Dr. Emmanuel S. Pilli and Prof. Vijay Varadharajan (2017). She is a B. Tech and M. Tech Gold Medalist. She has published various SCI/SCIE indexed reputed International Journals and reputed conference papers in the area of security and privacy. Some of her key research publications have been published in IEEE Transaction on Cloud Computing (with IF 5.720), IEEE Communication Surveys and Tutorials (with IF 25.249), IEEE Transactions on Industrial Informatics (IF: 9+) etc. as main author. She has also published several publications in reputed international conferences. She worked as a visiting scholar in Macquarie University Sydney under Prof. Vijay Varadharajan in 2015 and has been awarded a fellowship, administered by the Department Administrators in Department of Computing, Macquarie University, Sydney. She has also been awarded by Graphic Era Deemed to be University Dehradun for outstanding contribution in research. Her research proposal, valued more than 20 lakhs got approved by SERB-DST, Govt. of India in the area of Cloud Security. Her area of interest includes Cloud Security, E-mail Security and Network Security, Internet of Things, Blockchain, Cyber Security, Mobile Security, Adversarial Machine Learning etc. She is currently serving as a Lead Guest Editor in IEEE Transaction on Industrial Informatics (TII). Emmanuel S. Pilli received his Ph.D. from IIT, Roorkee (2012) and is currently an Associate Professor and Head of Dept. of CSE in Malaviya National Institute of Technology, Jaipur, India. Pilli Emmanuel Shubhakar has 21 years of teaching, research and administrative experience. He completed a research project "Investigating the Source of Spoofed E- mails" from UCOST, Dehradun in 2016. He has coauthored a book "Fundamentals of Network Forensics - A Research Perspective" for Springer in 2016. A total of 4 students have been awarded PhD under his supervision and 12 Ph. D students are pursuing their research. He is Senior Member of both IEEE and ACM. His areas of interest include Security and Forensics, Cloud Computing, Big Data, IoT, Darkweb, and Blockchain etc. He is member of Cloud Computing Innovation Council of India (CCICI) and Forensic Science Workgroup on Cloud Computing of the NIST, USA. Dr. R.C. Joshi Former Prof. E. & C.E. Department at IIT Roorkee and Chancellor at Graphic Era University Dehradun, received his B.E degree from NIT Allahabad in1967, M.E.1st Div. with Honors and Ph.D Degree from Roorkee University, now IIT Roorkee, in 1970 & 1980 respectively. He worked as a Lecturer in J.K Institute, Allahabad University during 1967-68.He joined Roorkee University in 1970 as Lecturer, became Reader in 1980 and Prof. in 1987. He had been Head of Electronics & Computer Engineering from Jan 1991-1994 & Jan. 1997 to Dec. 1999. He was also the Head of Institute Computer Centre, IIT Roorkee from March 1994 to Dec. 2005.He was on short visiting Professor's Assignment in University of Cincinnati, USA. University of Minnesota, U.S.A & Macquarie University Sydney Australia also visited France under Indo-France collaboration program during June 78 to Nov. 79. Dr. Joshi has guided 27 Ph.Ds, 250 M.Tech, Dissertation, 75 B.E Projects. He had taught more than 25 subjects in Computer Engineering, Electronics Engineering & Information Technology. He has worked as a Principal Investigator in number of Sponsored Projects of Ministry of Information & Communication Technology, DRDO, AICTE, UNDP, ISEA etc.
Part 1: Fundamentals: Basics of Cloud Computing along with Security
Aspects. 1. Introduction to Cloud Computing. 2. Introduction to Cloud
Security. 3. Cloud Security and Privacy Issues. Part 2: Threat Model,
Attacks, Defense Systems and Security Techniques. 4. Threat Model and Cloud
Attacks. 5. Classification of Intrusion Detection Systems in Cloud. 6.
Intrusion Detection Techniques in Cloud. Part 3: Tools and Advances. 7.
Overview of Tools (Attack/Security) in Cloud. 8. Virtual Machine
Introspection and Hypervisor Introspection. 9. Container Security.
Aspects. 1. Introduction to Cloud Computing. 2. Introduction to Cloud
Security. 3. Cloud Security and Privacy Issues. Part 2: Threat Model,
Attacks, Defense Systems and Security Techniques. 4. Threat Model and Cloud
Attacks. 5. Classification of Intrusion Detection Systems in Cloud. 6.
Intrusion Detection Techniques in Cloud. Part 3: Tools and Advances. 7.
Overview of Tools (Attack/Security) in Cloud. 8. Virtual Machine
Introspection and Hypervisor Introspection. 9. Container Security.
Part 1: Fundamentals: Basics of Cloud Computing along with Security
Aspects. 1. Introduction to Cloud Computing. 2. Introduction to Cloud
Security. 3. Cloud Security and Privacy Issues. Part 2: Threat Model,
Attacks, Defense Systems and Security Techniques. 4. Threat Model and Cloud
Attacks. 5. Classification of Intrusion Detection Systems in Cloud. 6.
Intrusion Detection Techniques in Cloud. Part 3: Tools and Advances. 7.
Overview of Tools (Attack/Security) in Cloud. 8. Virtual Machine
Introspection and Hypervisor Introspection. 9. Container Security.
Aspects. 1. Introduction to Cloud Computing. 2. Introduction to Cloud
Security. 3. Cloud Security and Privacy Issues. Part 2: Threat Model,
Attacks, Defense Systems and Security Techniques. 4. Threat Model and Cloud
Attacks. 5. Classification of Intrusion Detection Systems in Cloud. 6.
Intrusion Detection Techniques in Cloud. Part 3: Tools and Advances. 7.
Overview of Tools (Attack/Security) in Cloud. 8. Virtual Machine
Introspection and Hypervisor Introspection. 9. Container Security.