Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Автор: Xingming Sun; Alex Liu; Han-Chien Chao; Elisa Bert Название: Cloud Computing and Security ISBN: 331948673X ISBN-13(EAN): 9783319486734 Издательство: Springer Рейтинг: Цена: 11460.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
Автор: Xingming Sun; Alex Liu; Han-Chieh Chao; Elisa Bert Название: Cloud Computing and Security ISBN: 3319486705 ISBN-13(EAN): 9783319486703 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions.
Автор: Alani Название: Elements of Cloud Computing Security ISBN: 3319414100 ISBN-13(EAN): 9783319414102 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
Автор: Xingming Sun; Han-Chieh Chao; Xingang You; Elisa B Название: Cloud Computing and Security ISBN: 331968504X ISBN-13(EAN): 9783319685045 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly
refereed post-conference proceedings of the Third International
Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing,
China, in June 2017.
The 116 full papers and 11 short papers of these volumes were carefully
reviewed and selected from 391 submissions. The papers are organized
in topical sections such as: information hiding; cloud computing; IOT
applications; information security; multimedia applications; optimization
and classification.
Автор: Xingming Sun; Han-Chieh Chao; Xingang You; Elisa B Название: Cloud Computing and Security ISBN: 3319685414 ISBN-13(EAN): 9783319685410 Издательство: Springer Рейтинг: Цена: 15372.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.
The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
Автор: Siani Pearson; George Yee Название: Privacy and Security for Cloud Computing ISBN: 1447157931 ISBN-13(EAN): 9781447157939 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: In this book, leading experts analyze advances in privacy, security and risk technologies in cloud computing environments, including security, enterprise risk management and more, offering both a solid overview of the field and novel, cutting-edge research.
Автор: Surya Nepal; Mukaddim Pathan Название: Security, Privacy and Trust in Cloud Systems ISBN: 3662511657 ISBN-13(EAN): 9783662511657 Издательство: Springer Рейтинг: Цена: 16977.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It includes case studies as well as a tutorial on cloud security and eGovernance.
Автор: Jones Название: Global Information Warfare ISBN: 1498703259 ISBN-13(EAN): 9781498703253 Издательство: Taylor&Francis Рейтинг: Цена: 19906.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.
In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.
Upgrades to the Second Edition Include:
Revised discussions of changes and impacts of global information warfare since 2002
Updated analyses of the capabilities of several nation-states as well as nonstate actors
A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW
Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition
The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats.
The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru