Cloud Security (eBook, PDF)
Concepts, Applications and Perspectives
Redaktion: Gupta, Brij B.
69,95 €
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
35 °P sammeln
69,95 €
Als Download kaufen
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
35 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
69,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
35 °P sammeln
Cloud Security (eBook, PDF)
Concepts, Applications and Perspectives
Redaktion: Gupta, Brij B.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 1 (eBook, PDF)34,95 €
- Brij B. GuptaA Beginner's Guide to Internet of Things Security (eBook, PDF)20,95 €
- Atif AliDark World (eBook, PDF)49,95 €
- Toby DerocheAgile Audit Transformation and Beyond (eBook, PDF)46,95 €
- Cybercrime in Social Media (eBook, PDF)46,95 €
- Shaun AghiliThe Auditor's Guide to Blockchain Technology (eBook, PDF)36,95 €
- Philippe PeretInformation System Audit (eBook, PDF)46,95 €
-
-
-
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 258
- Erscheinungstermin: 25. Mai 2021
- Englisch
- ISBN-13: 9781000357301
- Artikelnr.: 61429627
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 258
- Erscheinungstermin: 25. Mai 2021
- Englisch
- ISBN-13: 9781000357301
- Artikelnr.: 61429627
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Brij B. Gupta received a PhD degree from Indian Institute of Technology Roorkee, India. In 2009, he was selected for the Canadian Commonwealth Scholarship awarded by the Government of Canada. He published more than 250 research papers in International Journals and Conferences of high repute. At present, Dr. Gupta is working as an Assistant Professor with National Institute of Technology, Kurukshetra, India. His research interest includes Information Security, Cyber Security, Cloud Computing, Web Securit, and Phishing.
Secured IoT devices management in Cloud-Fog Environment using Blockchain.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Secured IoT devices management in Cloud-Fog Environment using Blockchain.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.
Integrating Cloud and Health Informatics: Approaches, Applications and
Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on
HTTP. Explicating Fog Computing: Key Research Challenges and Solutions.
Comparison of Various Techniques for Emergency Vehicle Detection using
Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure
Authentication Protocol with Privacy Preserving for Industrial Internet of
Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party
Authenticated Key Exchange Protocol for Mobile Environment.
Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber
Physical Systems. Active Forgery Detection in Grayscale Images using
CRC-8based Fragile Watermarking. Android Malware Classification using
Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute
Based Encryption for Internet of Things. An Improved Two Factor
Authentication Scheme for TMIS based on Dual Biometrics. Identifying and
Mitigating Against XSS Attacks in Web Applications. Statistical Analysis
Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud
based Security Analysis in Body Area Network for Health Care Applications.
Fog Robotics: A New Perspective for Cloud-based Robots.