Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 1,42
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2015
ISBN 10: 1449360882 ISBN 13: 9781449360887
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Good. 1st Edition. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2015
ISBN 10: 1449360882 ISBN 13: 9781449360887
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Good. 1st Edition. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2015
ISBN 10: 3659425982 ISBN 13: 9783659425981
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
EUR 10,19
Anzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Very Good. Cloud Computing and Cyber Security: A Comprehensive Guide to Secure Cloud Computing This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. .
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing -, 2015
ISBN 10: 3659425982 ISBN 13: 9783659425981
Anbieter: Bahamut Media, Reading, Vereinigtes Königreich
EUR 10,19
Anzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee.
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 12,23
Anzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 17,03
Anzahl: 2 verfügbar
In den WarenkorbZustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
XII, 343 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2019
ISBN 10: 3659550302 ISBN 13: 9783659550300
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 67,71
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 68 pages. 8.66x5.91x0.16 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 74,13
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 128 pages. 9.25x6.10x0.47 inches. In Stock.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6138386469 ISBN 13: 9786138386469
Anbieter: moluna, Greven, Deutschland
EUR 45,45
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
EUR 91,93
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Sprache: Englisch
Verlag: Lap Lambert Academic Publishing, 2013
ISBN 10: 3659467588 ISBN 13: 9783659467585
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 99,25
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 100 pages. 8.66x5.91x0.23 inches. In Stock.
Sprache: Englisch
Verlag: Lap Lambert Academic Publishing, 2013
ISBN 10: 3659467588 ISBN 13: 9783659467585
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 100,03
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 100 pages. 8.66x5.91x0.23 inches. In Stock.
Sprache: Englisch
Verlag: Springer Nature Singapore, Springer Nature Singapore Sep 2018, 2018
ISBN 10: 9811325227 ISBN 13: 9789811325229
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 128 pp. Englisch.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 356 | Sprache: Englisch | Produktart: Bücher | This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine¿s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission¿s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system¿s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.
Sprache: Englisch
Verlag: Springer Nature Singapore, Springer Nature Singapore, 2018
ISBN 10: 9811325227 ISBN 13: 9789811325229
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659467588 ISBN 13: 9783659467585
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Secure Cloud Computing with Client-Based Control System | Protection of Stored Cloud-Based Data by Increasing End-User's Role | Faraz Fatemi Moghaddam | Taschenbuch | 100 S. | Englisch | 2013 | LAP LAMBERT Academic Publishing | EAN 9783659467585 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Learn how to build data-intensive apps that run faster at a lower cost, using Google Compute Engine. Written by Google engineers, this book walks you through Google s new Infrastructure as a Service (IaaS) product. You ll discover how to leverage Google s world-class storage and computing technologies to gain unparalleled performance and scalability.
EUR 89,99
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New.
EUR 98,54
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2022
ISBN 10: 6200568693 ISBN 13: 9786200568694
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Cloud Computing | Novel Models for Secure Resource Allocation in Cloud Infrastructure | Jangala Sasi Kiran (u. a.) | Taschenbuch | Englisch | 2022 | LAP LAMBERT Academic Publishing | EAN 9786200568694 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2014
ISBN 10: 1461492777 ISBN 13: 9781461492771
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 152,09
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 343 pages. 9.25x6.25x0.75 inches. In Stock.
Sprache: Englisch
Verlag: Springer New York, Springer New York Jan 2014, 2014
ISBN 10: 1461492777 ISBN 13: 9781461492771
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine¿s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud.In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers.In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates.In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server.In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission¿s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system¿s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 356 pp. Englisch.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2015
ISBN 10: 3659425982 ISBN 13: 9783659425981
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 392 | Sprache: Englisch | Produktart: Bücher | As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. There is no question that these emerging technologies introduce new risks such as Virtualization hinders monitoring and can lead to server sprawl, Multi-tenancy exposes risks of data leakage to co-tenants, Outsourcing reduces both control and visibility over services and data, Internet service delivery increases the exposure of valuable information assets, Ambiguity in jurisdiction and national regulations complicates regulatory compliance, Lack of standardization can lead to a lock-in binding customers to their providers. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Fortunately, there are also many security benefits that customers can enjoy as they implement cloud services.
Sprache: Englisch
Verlag: LAP LAMBERT Academic Publishing, 2015
ISBN 10: 3659425982 ISBN 13: 9783659425981
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Gut. Zustand: Gut | Seiten: 392 | Sprache: Englisch | Produktart: Bücher | As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. There is no question that these emerging technologies introduce new risks such as Virtualization hinders monitoring and can lead to server sprawl, Multi-tenancy exposes risks of data leakage to co-tenants, Outsourcing reduces both control and visibility over services and data, Internet service delivery increases the exposure of valuable information assets, Ambiguity in jurisdiction and national regulations complicates regulatory compliance, Lack of standardization can lead to a lock-in binding customers to their providers. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Fortunately, there are also many security benefits that customers can enjoy as they implement cloud services.
Sprache: Englisch
Verlag: Springer New York, Springer New York, 2014
ISBN 10: 1461492777 ISBN 13: 9781461492771
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.