Privacy and security challenges in cloud computing: a holistic approach
This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, mov...
Gespeichert in:
Weitere beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2022
|
Schriftenreihe: | Cognitive approaches in cloud and edge computing
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000542790/?ar |
Zusammenfassung: | This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology. |
Beschreibung: | Includes bibliographical references and index. - Description based on print version record |
Umfang: | 1 Online-Ressource (xv, 275 Seiten) illustrations (black and white). |
ISBN: | 9781000542790 1000542793 9781003219880 1003219888 9781000542752 1000542750 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092807860 | ||
003 | DE-627-1 | ||
005 | 20240228121956.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230530s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781000542790 |c electronic bk. |9 978-1-000-54279-0 | ||
020 | |a 1000542793 |c electronic bk. |9 1-000-54279-3 | ||
020 | |a 9781003219880 |c electronic bk. |9 978-1-003-21988-0 | ||
020 | |a 1003219888 |c electronic bk. |9 1-003-21988-8 | ||
020 | |a 9781000542752 |c electronic bk. ; |9 978-1-000-54275-2 | ||
020 | |a 1000542750 |c electronic bk. ; |9 1-000-54275-0 | ||
035 | |a (DE-627-1)092807860 | ||
035 | |a (DE-599)KEP092807860 | ||
035 | |a (ORHE)9781000542790 | ||
035 | |a (DE-627-1)092807860 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a TJFM |2 bicssc | |
082 | 0 | |a 004.67/82 |2 23/eng/20230509 | |
245 | 1 | 0 | |a Privacy and security challenges in cloud computing |b a holistic approach |c edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (xv, 275 Seiten) |b illustrations (black and white). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Cognitive approaches in cloud and edge computing | |
500 | |a Includes bibliographical references and index. - Description based on print version record | ||
520 | |a This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Data privacy | |
650 | 0 | |a Computer security | |
650 | 0 | |a Cloud computing | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Confidentialité des données | |
650 | 4 | |a TECHNOLOGY ; Electronics ; General | |
650 | 4 | |a Cloud computing | |
700 | 1 | |a Kumar, T. Ananth |e HerausgeberIn |4 edt | |
700 | 1 | |a Samuel, T. S. Arun |e HerausgeberIn |4 edt | |
700 | 1 | |a Samuel, R. Dinesh Jackson |e HerausgeberIn |4 edt | |
700 | 1 | |a Niranjanamurthy, M. |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781032113555 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032113555 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000542790/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-092807860 |
---|---|
_version_ | 1821494941883301888 |
adam_text | |
any_adam_object | |
author2 | Kumar, T. Ananth Samuel, T. S. Arun Samuel, R. Dinesh Jackson Niranjanamurthy, M. |
author2_role | edt edt edt edt |
author2_variant | t a k ta tak t s a s tsa tsas r d j s rdj rdjs m n mn |
author_facet | Kumar, T. Ananth Samuel, T. S. Arun Samuel, R. Dinesh Jackson Niranjanamurthy, M. |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092807860 (DE-599)KEP092807860 (ORHE)9781000542790 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03334cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-092807860</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121956.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000542790</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-54279-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000542793</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-54279-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003219880</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-21988-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003219888</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-21988-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000542752</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">978-1-000-54275-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000542750</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">1-000-54275-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092807860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000542790</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TJFM</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23/eng/20230509</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy and security challenges in cloud computing</subfield><subfield code="b">a holistic approach</subfield><subfield code="c">edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 275 Seiten)</subfield><subfield code="b">illustrations (black and white).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cognitive approaches in cloud and edge computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidentialité des données</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY ; Electronics ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, T. Ananth</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samuel, T. S. Arun</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samuel, R. Dinesh Jackson</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niranjanamurthy, M.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032113555</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032113555</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000542790/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092807860 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:23Z |
institution | BVB |
isbn | 9781000542790 1000542793 9781003219880 1003219888 9781000542752 1000542750 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xv, 275 Seiten) illustrations (black and white). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC Press |
record_format | marc |
series2 | Cognitive approaches in cloud and edge computing |
spelling | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy Boca Raton, FL CRC Press 2022 ©2022 1 Online-Ressource (xv, 275 Seiten) illustrations (black and white). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cognitive approaches in cloud and edge computing Includes bibliographical references and index. - Description based on print version record This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology. Cloud computing Security measures Data privacy Computer security Cloud computing Computer Security Infonuagique Sécurité informatique Infonuagique ; Sécurité ; Mesures Confidentialité des données TECHNOLOGY ; Electronics ; General Kumar, T. Ananth HerausgeberIn edt Samuel, T. S. Arun HerausgeberIn edt Samuel, R. Dinesh Jackson HerausgeberIn edt Niranjanamurthy, M. HerausgeberIn edt 9781032113555 Erscheint auch als Druck-Ausgabe 9781032113555 |
spellingShingle | Privacy and security challenges in cloud computing a holistic approach Cloud computing Security measures Data privacy Computer security Cloud computing Computer Security Infonuagique Sécurité informatique Infonuagique ; Sécurité ; Mesures Confidentialité des données TECHNOLOGY ; Electronics ; General |
title | Privacy and security challenges in cloud computing a holistic approach |
title_auth | Privacy and security challenges in cloud computing a holistic approach |
title_exact_search | Privacy and security challenges in cloud computing a holistic approach |
title_full | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_fullStr | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_full_unstemmed | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_short | Privacy and security challenges in cloud computing |
title_sort | privacy and security challenges in cloud computing a holistic approach |
title_sub | a holistic approach |
topic | Cloud computing Security measures Data privacy Computer security Cloud computing Computer Security Infonuagique Sécurité informatique Infonuagique ; Sécurité ; Mesures Confidentialité des données TECHNOLOGY ; Electronics ; General |
topic_facet | Cloud computing Security measures Data privacy Computer security Cloud computing Computer Security Infonuagique Sécurité informatique Infonuagique ; Sécurité ; Mesures Confidentialité des données TECHNOLOGY ; Electronics ; General |
work_keys_str_mv | AT kumartananth privacyandsecuritychallengesincloudcomputingaholisticapproach AT samueltsarun privacyandsecuritychallengesincloudcomputingaholisticapproach AT samuelrdineshjackson privacyandsecuritychallengesincloudcomputingaholisticapproach AT niranjanamurthym privacyandsecuritychallengesincloudcomputingaholisticapproach |