Building the Infrastructure for Cloud Security A Solutions view /
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book hig...
Na minha lista:
Main Authors: | Yeluri, Raghu (Author), Castro-Leon, Enrique (Author) |
---|---|
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Berkeley, CA :
Apress : Imprint: Apress,
2014.
|
Assuntos: | |
Acesso em linha: | http://dx.doi.org/10.1007/978-1-4302-6146-9 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Por: Salam, Abdul
Publicado em: (2015)
Por: Salam, Abdul
Publicado em: (2015)
Securing information and communications systems principles, technologies, and applications /
Publicado em: (2008)
Publicado em: (2008)
The InfoSec Handbook An Introduction to Information Security /
Por: Rao, Umesh Hodeghatta, et al.
Publicado em: (2014)
Por: Rao, Umesh Hodeghatta, et al.
Publicado em: (2014)
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Por: Futral, William, et al.
Publicado em: (2013)
Por: Futral, William, et al.
Publicado em: (2013)
Managing Risk and Information Security Protect to Enable /
Por: Harkins, Malcolm
Publicado em: (2013)
Por: Harkins, Malcolm
Publicado em: (2013)
Platform Embedded Security Technology Revealed
Por: Ruan, Xiaoyu
Publicado em: (2014)
Por: Ruan, Xiaoyu
Publicado em: (2014)
Hashing in computer science fifty years of slicing and dicing /
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Por: Konheim, Alan G., 1934-
Publicado em: (2010)
Trusted platform module basics using TPM in embedded systems /
Por: Kinney, Steven
Publicado em: (2006)
Por: Kinney, Steven
Publicado em: (2006)
Modelling cyber security approaches, methodology, strategies /
Publicado em: (2009)
Publicado em: (2009)
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Por: Arthur, Will, et al.
Publicado em: (2015)
Por: Arthur, Will, et al.
Publicado em: (2015)
Quantum cryptography potentially perfect security.
Publicado em: (2003)
Publicado em: (2003)
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Por: Dennedy, Michelle Finneran, et al.
Publicado em: (2014)
Por: Dennedy, Michelle Finneran, et al.
Publicado em: (2014)
Implementing SSH strategies for optimizing the Secure Shell /
Por: Dwivedi, Himanshu
Publicado em: (2004)
Por: Dwivedi, Himanshu
Publicado em: (2004)
Cryptography protocols, design and applications /
Publicado em: (2012)
Publicado em: (2012)
Understanding bitcoin : cryptography, engineering and economics. /
Por: Franco, Pedro
Publicado em: (2015)
Por: Franco, Pedro
Publicado em: (2015)
Cryptography and network security : principles and practice /
Por: Stallings, William
Publicado em: (2006)
Por: Stallings, William
Publicado em: (2006)
A comparison between smart cards and trusted platform modules in business scenarios
Por: Murhammer, Martin W.
Publicado em: (2008)
Por: Murhammer, Martin W.
Publicado em: (2008)
Security secrets, intruders and ID tags.
Publicado em: (2003)
Publicado em: (2003)
Introduction to identity-based encryption
Por: Martin, Luther
Publicado em: (2008)
Por: Martin, Luther
Publicado em: (2008)
Outsourcing information security
Por: Axelrod, C. Warren
Publicado em: (2004)
Por: Axelrod, C. Warren
Publicado em: (2004)
Identity-based cryptography
Publicado em: (2009)
Publicado em: (2009)
Color image watermarking : algorithms and technologies /
Por: Su, Qingtang
Publicado em: (2017)
Por: Su, Qingtang
Publicado em: (2017)
Relation based access control /
Por: Zhang, Rui
Publicado em: (2010)
Por: Zhang, Rui
Publicado em: (2010)
ExamWise for CIW security professional exam 1D0-470 /
Por: Bayer, Chad M.
Publicado em: (2003)
Por: Bayer, Chad M.
Publicado em: (2003)
Managing risk and information security : protect to enable /
Por: Harkins, Malcolm W
Publicado em: (2016)
Por: Harkins, Malcolm W
Publicado em: (2016)
Video encryption technology and application
Por: Xu, Zhengquan, 1962-
Publicado em: (2010)
Por: Xu, Zhengquan, 1962-
Publicado em: (2010)
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Por: Blanchette, Jean-François
Publicado em: (2012)
Por: Blanchette, Jean-François
Publicado em: (2012)
Machine learning in image steganalysis
Por: Schaathun, Hans Georg
Publicado em: (2012)
Por: Schaathun, Hans Georg
Publicado em: (2012)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
Por: Omollo, Richard Otieno, et al.
Publicado em: (2025)
Por: Omollo, Richard Otieno, et al.
Publicado em: (2025)
Brute Force Cracking the Data Encryption Standard /
Por: Curtin, Matt
Publicado em: (2005)
Por: Curtin, Matt
Publicado em: (2005)
Quantum cryptography and computing theory and implementation /
Publicado em: (2010)
Publicado em: (2010)
Privacy and Identity Management for Life
Por: Camenisch, Jan
Publicado em: (2011)
Por: Camenisch, Jan
Publicado em: (2011)
Information security policy, processes, and practices /
Publicado em: (2008)
Publicado em: (2008)
Homeland security techniques and technologies
Por: Mena, Jesus
Publicado em: (2004)
Por: Mena, Jesus
Publicado em: (2004)
Information assurance and computer security
Publicado em: (2006)
Publicado em: (2006)
Comptia Security+ 2008 in depth
Por: Ciampa, Mark D.
Publicado em: (2009)
Por: Ciampa, Mark D.
Publicado em: (2009)
Privacy protection and computer forensics
Por: Caloyannides, Michael A.
Publicado em: (2004)
Por: Caloyannides, Michael A.
Publicado em: (2004)
Detection and intelligent systems for homeland security. /
Publicado em: (2014)
Publicado em: (2014)
Black hat physical device security exploiting hardware and software /
Por: Miller, Drew
Publicado em: (2005)
Por: Miller, Drew
Publicado em: (2005)
A process for developing a common vocabulary in the information security area
Publicado em: (2007)
Publicado em: (2007)
Registos relacionados
-
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Por: Salam, Abdul
Publicado em: (2015) -
Securing information and communications systems principles, technologies, and applications /
Publicado em: (2008) -
The InfoSec Handbook An Introduction to Information Security /
Por: Rao, Umesh Hodeghatta, et al.
Publicado em: (2014) -
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Por: Futral, William, et al.
Publicado em: (2013) -
Managing Risk and Information Security Protect to Enable /
Por: Harkins, Malcolm
Publicado em: (2013)