SECURITY FOR CLOUD COMPUTING
Material type:
- 978-1-60807-989-6
- 005.8/LOM/PIE
Item type | Current library | Collection | Call number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Symbiosis Institute of Computer Studies and Research Reference | Reference | 005.8/LOM/PIE (Browse shelf(Opens below)) | Available | CLOUD COMPUTING - SECURITY MEASURES | SICSR-B-19583 |
Browsing Symbiosis Institute of Computer Studies and Research shelves, Shelving location: Reference, Collection: Reference Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
No cover image available | ||
005.8/ISO/IEC INTERNATIONAL STANDARD(ISO/IEC-27002):INFORMATION TECHNOLOGY-SECIRITY-TECHNIQUES:CODE OF PRACTICE FOR INFORMATION SECURITY) | 005.8/KIZ COMPUTER SECURITY | 005.8/LIM/COO SECURING CLOUD AND MOBILITY: A PRACTITIONER'S GUIDE | 005.8/LOM/PIE SECURITY FOR CLOUD COMPUTING | 005.8/MUK/CHA HARDWARE SECURITY:DESIGN,THREATS AND SAFEGUARDS | 005.8/WU/ZHA WEB SECURITY:A WHITEHAT PERSPECTIVE | 006.6'76 MIC MICROSOFT WINDOWS MULTIMEDIA PROGRAMMERS WORK BOOK |
This book shows that present cloud computing is inherently insecure therefore advanced execution models have to be developed to prevent unauthorized users from accessing or affecting others' data and computation. The cloud approach enables on-demand scalable services that allow performing large computations without the costs and maintenance/management issues of costly server farms (thus enabling a novel kind of outsourced computing). Essential reading for software and computer engineers as well as data architects and IT professionals to better understand the complexity and heterogeneity of modern cloud- based scenarios.
There are no comments on this title.