Cloud Security (eBook, ePUB)
Concepts, Applications and Practices
Redaktion: Murthy, Jamuna S.; G., Srinivasa K.; G. M., Siddesh
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Cloud Security (eBook, ePUB)
Concepts, Applications and Practices
Redaktion: Murthy, Jamuna S.; G., Srinivasa K.; G. M., Siddesh
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.02MB
Andere Kunden interessierten sich auch für
- Cloud Security (eBook, PDF)52,95 €
- Brij B. GuptaDistributed Denial of Service (DDoS) Attacks (eBook, ePUB)21,95 €
- Rafay BalochWeb Hacking Arsenal (eBook, ePUB)37,95 €
- Brij B. GuptaOnline Social Networks Security (eBook, ePUB)21,95 €
- B. B. GuptaCross-Site Scripting Attacks (eBook, ePUB)20,95 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity (eBook, ePUB)47,95 €
- Erdal OzkayaInside the Dark Web (eBook, ePUB)51,95 €
-
-
-
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Erscheinungstermin: 28. August 2024
- Englisch
- ISBN-13: 9781040103685
- Artikelnr.: 72271325
- Verlag: Taylor & Francis
- Erscheinungstermin: 28. August 2024
- Englisch
- ISBN-13: 9781040103685
- Artikelnr.: 72271325
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Jamuna S Murthy is currently working as an Assistant Professor in the Department of Computer Science and Engineering at Ramaiah Institute of Technology, Bengaluru. She is pursuing her PhD degree in the area of Deep Learning. She has been academic topper throughout her education and has received Best Project Award for her M.Tech thesis work from Ramaiah Institute of Technology under the year 2017. She has received funding from DST for product development called "FitQua: Smart Water Bottle" under the year 2020 - 2022. She specializes in the 'Architecting with Google Compute Engine' certification by Google Cloud and is recognized as a Certified Educator. She also holds a good publication record of peer reviewed International Conferences such as ICACNI-2017, ICACDS 2021 & 2022, COMSYS -2023. Her journals and Book Publications include IGI Global, Springer etc. Her research interests include Cloud Computing and Big Data, Theoretical Computer Science, Machine Learning, Deep Learning and Natural Language Processing. She is a distinguished member of Association for Computing Machinery, National Society of Professional Engineers (NSPE) and ISTE. Dr. Siddesh G M is currently working as Professor and Head in Department of Artificial Intelligence and Data Science, M S Ramaiah Institute of Technology, Bangalore. He is the recipient of Seed Money to Young Scientist for Research (SMYSR) for FY 2014-15, from Government of Karnataka, Vision Group on Science and Technology (VGST). He has published a good number of research papers in reputed International Conferences and Journals. He has authored books on Network Data Analytics, Statistical Programming in R, Internet of Things with Springer, Oxford University Press and Cengage publishers respectively. He has edited research monographs in the area of Cyber Physical Systems, Fog Computing and Energy Aware Computing, Bioinformatics with CRC Press, IGI Global and Springer publishers respectively. His research interests include Internet of Things, Distributed Computing and Data Analytics.He is a member of ISTE, IETE etc. Dr. Srinivasa K G is a Professor of Data Science and Artificial Intelligence Programme at DSPM IIIT-Naya Raipur, C. G. India. He received his Ph.D. in Computer Science and Engineering from Bangalore University in 2007. He is the recipient of All India Council for Technical Education - Career Award for Young Teachers, Indian Society of Technical Education - ISGITS National Award for Best Research Work Done by Young Teachers, Institution of Engineers (India) - IEI Young Engineer Award in Computer Engineering, Rajarambapu Patil National Award for Promising Engineering Teacher Award from ISTE - 2012, IMS Singapore - Visiting Scientist Fellowship Award. He has published more than 150 research papers in International Conferences and Journals. He has visited many Universities abroad as a visiting researcher - He has visited University of Oklahoma, USA, Iowa State University, USA, Hong Kong University, Korean University, National University of Singapore, University of British Columbia, Canada are his few prominent visits. He has authored many books in the area of Learning Analytics, Network Data Analytics, Soft Computing, Social Network Analysis, High Performance Computing, R Programming etc. with prestigious international publishers like Springer, TMH, Oxford, Cengage, and IGI Global. He has edited research monographs in the area of Cyber Physical Systems, Fog Computing and Energy Aware Computing with CRC Press and IGI Global. He has been awarded BOYSCAST Fellowship by DST, Govt. of India, for conducting post-doctoral research work at University of Melbourne, Australia. His recent research areas include Innovative Teaching Practices in Engineering Education, pedagogy; outcomes based education.He is the senior member of IEEE and ACM.
1: Collaborative Cloud: Safeguarding Sensitive Information through
Innovative Secure Data Sharing Practices 2: Orchestrating Data Integrity
through Remote Auditing and Compliance Assurance 3: Navigating the Abyss -
Illuminating Data Leakage Threats, Mitigations, and Future Horizons 4:
Decoding the Cloud: A Comprehensive Exploration of Data Loss Scenarios,
Resilient Storage Architectures, and Advanced Backup Strategies in Cloud
Environments 5: Cryptographic Bastions: Mastering Cloud Security through
Advanced Access Control and Encryption Strategies 6: Harnessing Data
Provenance and Security Attribution for Resilient Cloud Systems 7: Identity
Threads in the Cloud Tapestry: A Comprehensive Study of Federated Identity
Management and Its Role in Ensuring Cloud Security 8: Anticipating the
Evolution of Data Accountability Through Technological Advancements and
Regulatory Landscape Changes 9: Secure Multi-Party Computation: Protocols,
Collaborative Data Processing, and Real-world Applications in Industry 10:
Role-Based Virtuosity in Virtual Environments - A Technical Exploration of
Access Control and Authentication Mechanisms 11: Fortifying Cyber
Resilience in the Ever-Changing Sky of Cloud Security 12: SCiphered Clouds
and Quantum Secrets: Navigating Secure Information Flow with Emerging
Encryption Technologies 13: Securing Mobile Workspaces in the Cloud:
Navigating Bring Your Own Device (BYOD) Challenges with Cyber Resilience
14: CloudGuardian: Safeguarding the Internet of Things (IoT) - Navigating
Security Frontiers in Cloud-Connected Ecosystems 15: Cloud-Driven Security
for Cyber-Physical Systems: Strategies, Threats, and Future Horizons 16.
Annexure
Innovative Secure Data Sharing Practices 2: Orchestrating Data Integrity
through Remote Auditing and Compliance Assurance 3: Navigating the Abyss -
Illuminating Data Leakage Threats, Mitigations, and Future Horizons 4:
Decoding the Cloud: A Comprehensive Exploration of Data Loss Scenarios,
Resilient Storage Architectures, and Advanced Backup Strategies in Cloud
Environments 5: Cryptographic Bastions: Mastering Cloud Security through
Advanced Access Control and Encryption Strategies 6: Harnessing Data
Provenance and Security Attribution for Resilient Cloud Systems 7: Identity
Threads in the Cloud Tapestry: A Comprehensive Study of Federated Identity
Management and Its Role in Ensuring Cloud Security 8: Anticipating the
Evolution of Data Accountability Through Technological Advancements and
Regulatory Landscape Changes 9: Secure Multi-Party Computation: Protocols,
Collaborative Data Processing, and Real-world Applications in Industry 10:
Role-Based Virtuosity in Virtual Environments - A Technical Exploration of
Access Control and Authentication Mechanisms 11: Fortifying Cyber
Resilience in the Ever-Changing Sky of Cloud Security 12: SCiphered Clouds
and Quantum Secrets: Navigating Secure Information Flow with Emerging
Encryption Technologies 13: Securing Mobile Workspaces in the Cloud:
Navigating Bring Your Own Device (BYOD) Challenges with Cyber Resilience
14: CloudGuardian: Safeguarding the Internet of Things (IoT) - Navigating
Security Frontiers in Cloud-Connected Ecosystems 15: Cloud-Driven Security
for Cyber-Physical Systems: Strategies, Threats, and Future Horizons 16.
Annexure
1: Collaborative Cloud: Safeguarding Sensitive Information through
Innovative Secure Data Sharing Practices 2: Orchestrating Data Integrity
through Remote Auditing and Compliance Assurance 3: Navigating the Abyss -
Illuminating Data Leakage Threats, Mitigations, and Future Horizons 4:
Decoding the Cloud: A Comprehensive Exploration of Data Loss Scenarios,
Resilient Storage Architectures, and Advanced Backup Strategies in Cloud
Environments 5: Cryptographic Bastions: Mastering Cloud Security through
Advanced Access Control and Encryption Strategies 6: Harnessing Data
Provenance and Security Attribution for Resilient Cloud Systems 7: Identity
Threads in the Cloud Tapestry: A Comprehensive Study of Federated Identity
Management and Its Role in Ensuring Cloud Security 8: Anticipating the
Evolution of Data Accountability Through Technological Advancements and
Regulatory Landscape Changes 9: Secure Multi-Party Computation: Protocols,
Collaborative Data Processing, and Real-world Applications in Industry 10:
Role-Based Virtuosity in Virtual Environments - A Technical Exploration of
Access Control and Authentication Mechanisms 11: Fortifying Cyber
Resilience in the Ever-Changing Sky of Cloud Security 12: SCiphered Clouds
and Quantum Secrets: Navigating Secure Information Flow with Emerging
Encryption Technologies 13: Securing Mobile Workspaces in the Cloud:
Navigating Bring Your Own Device (BYOD) Challenges with Cyber Resilience
14: CloudGuardian: Safeguarding the Internet of Things (IoT) - Navigating
Security Frontiers in Cloud-Connected Ecosystems 15: Cloud-Driven Security
for Cyber-Physical Systems: Strategies, Threats, and Future Horizons 16.
Annexure
Innovative Secure Data Sharing Practices 2: Orchestrating Data Integrity
through Remote Auditing and Compliance Assurance 3: Navigating the Abyss -
Illuminating Data Leakage Threats, Mitigations, and Future Horizons 4:
Decoding the Cloud: A Comprehensive Exploration of Data Loss Scenarios,
Resilient Storage Architectures, and Advanced Backup Strategies in Cloud
Environments 5: Cryptographic Bastions: Mastering Cloud Security through
Advanced Access Control and Encryption Strategies 6: Harnessing Data
Provenance and Security Attribution for Resilient Cloud Systems 7: Identity
Threads in the Cloud Tapestry: A Comprehensive Study of Federated Identity
Management and Its Role in Ensuring Cloud Security 8: Anticipating the
Evolution of Data Accountability Through Technological Advancements and
Regulatory Landscape Changes 9: Secure Multi-Party Computation: Protocols,
Collaborative Data Processing, and Real-world Applications in Industry 10:
Role-Based Virtuosity in Virtual Environments - A Technical Exploration of
Access Control and Authentication Mechanisms 11: Fortifying Cyber
Resilience in the Ever-Changing Sky of Cloud Security 12: SCiphered Clouds
and Quantum Secrets: Navigating Secure Information Flow with Emerging
Encryption Technologies 13: Securing Mobile Workspaces in the Cloud:
Navigating Bring Your Own Device (BYOD) Challenges with Cyber Resilience
14: CloudGuardian: Safeguarding the Internet of Things (IoT) - Navigating
Security Frontiers in Cloud-Connected Ecosystems 15: Cloud-Driven Security
for Cyber-Physical Systems: Strategies, Threats, and Future Horizons 16.
Annexure