Related Books
Language: en
Pages: 95
Pages: 95
Type: BOOK - Published: 2019-02-09 - Publisher: Springer
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the co
Language: en
Pages: 338
Pages: 338
Type: BOOK - Published: 2009-09-04 - Publisher: "O'Reilly Media, Inc."
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many peo
Language: en
Pages: 396
Pages: 396
Type: BOOK - Published: 2011-08-26 - Publisher: CRC Press
The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down
Language: en
Pages: 376
Pages: 376
Type: BOOK - Published: 2014-09-17 - Publisher: Apress
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understa
Language: en
Pages: 2188
Pages: 2188
Type: BOOK - Published: 2021-04-23 - Publisher: IGI Global
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increa