Privacy and security challenges in cloud computing: a holistic approach
1. Security enhanced cloud for Serverless Computing and its applications2. Revealing the Web of Cloud Computing: Threats and Vulnerabilities3. Security and Privacy Provocation of Data in Cloud computing4. Networking Security incitements in Cloud Computing5. Security Concerns of Virtualization in Clo...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL ; London ; New York
CRC Press
[2022]
|
Ausgabe: | First edition |
Schriftenreihe: | Cognitive approaches in cloud and edge computing
|
Schlagworte: | |
Online-Zugang: | UBY01 UPA01 Volltext |
Zusammenfassung: | 1. Security enhanced cloud for Serverless Computing and its applications2. Revealing the Web of Cloud Computing: Threats and Vulnerabilities3. Security and Privacy Provocation of Data in Cloud computing4. Networking Security incitements in Cloud Computing5. Security Concerns of Virtualization in Cloud Computing6. Operational Security agitations in cloud computing7. Secure Data Storage and Retrieval Operations using Attribute-based Encryption for Mobile Cloud Computing8. Deep Dive on Popular Security Models and Strategies of Cloud Computing9. Quantum Computing and Quantum Cryptography10. An Extensive exploration of Privacy and compliance Considerations for hybrid cloud deployments11. Threat Detection and Incident Response in Cloud Security12. The Cyber Artificial Intelligence Platform for Cloud Security13. Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments |
Beschreibung: | 1 Online-Ressource (xvi, 275 Seiten) Illustrationen |
ISBN: | 9781003219880 |
DOI: | 10.1201/9781003219880 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV049068070 | ||
003 | DE-604 | ||
005 | 20240304 | ||
007 | cr|uuu---uuuuu | ||
008 | 230726s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781003219880 |c Online |9 978-1-00-321988-0 | ||
024 | 7 | |a 10.1201/9781003219880 |2 doi | |
024 | 7 | |a 10.1201/9781003219880 |2 doi | |
035 | |a (ZDB-7-TFC)9781003219880 | ||
035 | |a (OCoLC)1392149114 | ||
035 | |a (DE-599)KEP084077611 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-739 | ||
245 | 1 | 0 | |a Privacy and security challenges in cloud computing |b a holistic approach |c edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
250 | |a First edition | ||
264 | 1 | |a Boca Raton, FL ; London ; New York |b CRC Press |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a 1 Online-Ressource (xvi, 275 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cognitive approaches in cloud and edge computing | |
520 | 3 | |a 1. Security enhanced cloud for Serverless Computing and its applications2. Revealing the Web of Cloud Computing: Threats and Vulnerabilities3. Security and Privacy Provocation of Data in Cloud computing4. Networking Security incitements in Cloud Computing5. Security Concerns of Virtualization in Cloud Computing6. Operational Security agitations in cloud computing7. Secure Data Storage and Retrieval Operations using Attribute-based Encryption for Mobile Cloud Computing8. Deep Dive on Popular Security Models and Strategies of Cloud Computing9. Quantum Computing and Quantum Cryptography10. An Extensive exploration of Privacy and compliance Considerations for hybrid cloud deployments11. Threat Detection and Incident Response in Cloud Security12. The Cyber Artificial Intelligence Platform for Cloud Security13. Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments | |
653 | 0 | |a Cloud computing | |
653 | 0 | |a TECHNOLOGY / Electronics / General | |
700 | 1 | |a Kumar, T. Ananth |4 edt | |
700 | 1 | |a Samuel, T. S. Arun |4 edt | |
700 | 1 | |a Samuel, R. Dinesh Jackson |4 edt | |
700 | 1 | |a Niranjanamurthy, M. |0 (DE-588)1274469287 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-032-11355-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-032-11426-2 |
856 | 4 | 0 | |u https://doi.org/10.1201/9781003219880 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC |a ZDB-7-CSC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034330093 | ||
966 | e | |u https://doi.org/10.1201/9781003219880 |l UBY01 |p ZDB-7-TFC |q UBY_PDA_TFC_Kauf_22 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003219880 |l UPA01 |p ZDB-7-CSC |q UPA_PDA_CSC_Kauf2023 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185380454400000 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Kumar, T. Ananth Samuel, T. S. Arun Samuel, R. Dinesh Jackson Niranjanamurthy, M. |
author2_role | edt edt edt edt |
author2_variant | t a k ta tak t s a s tsa tsas r d j s rdj rdjs m n mn |
author_GND | (DE-588)1274469287 |
author_facet | Kumar, T. Ananth Samuel, T. S. Arun Samuel, R. Dinesh Jackson Niranjanamurthy, M. |
building | Verbundindex |
bvnumber | BV049068070 |
collection | ZDB-7-TFC ZDB-7-CSC |
ctrlnum | (ZDB-7-TFC)9781003219880 (OCoLC)1392149114 (DE-599)KEP084077611 |
doi_str_mv | 10.1201/9781003219880 |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02824nmm a22004691c 4500</leader><controlfield tag="001">BV049068070</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240304 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230726s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003219880</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-00-321988-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003219880</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003219880</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-TFC)9781003219880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1392149114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP084077611</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy and security challenges in cloud computing</subfield><subfield code="b">a holistic approach</subfield><subfield code="c">edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 275 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cognitive approaches in cloud and edge computing</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">1. Security enhanced cloud for Serverless Computing and its applications2. Revealing the Web of Cloud Computing: Threats and Vulnerabilities3. Security and Privacy Provocation of Data in Cloud computing4. Networking Security incitements in Cloud Computing5. Security Concerns of Virtualization in Cloud Computing6. Operational Security agitations in cloud computing7. Secure Data Storage and Retrieval Operations using Attribute-based Encryption for Mobile Cloud Computing8. Deep Dive on Popular Security Models and Strategies of Cloud Computing9. Quantum Computing and Quantum Cryptography10. An Extensive exploration of Privacy and compliance Considerations for hybrid cloud deployments11. Threat Detection and Incident Response in Cloud Security12. The Cyber Artificial Intelligence Platform for Cloud Security13. Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">TECHNOLOGY / Electronics / General</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, T. Ananth</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samuel, T. S. Arun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samuel, R. Dinesh Jackson</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niranjanamurthy, M.</subfield><subfield code="0">(DE-588)1274469287</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-032-11355-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-032-11426-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9781003219880</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield><subfield code="a">ZDB-7-CSC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034330093</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003219880</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">UBY_PDA_TFC_Kauf_22</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003219880</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-7-CSC</subfield><subfield code="q">UPA_PDA_CSC_Kauf2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049068070 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:26:15Z |
indexdate | 2024-07-10T09:54:19Z |
institution | BVB |
isbn | 9781003219880 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034330093 |
oclc_num | 1392149114 |
open_access_boolean | |
owner | DE-706 DE-739 |
owner_facet | DE-706 DE-739 |
physical | 1 Online-Ressource (xvi, 275 Seiten) Illustrationen |
psigel | ZDB-7-TFC ZDB-7-CSC ZDB-7-TFC UBY_PDA_TFC_Kauf_22 ZDB-7-CSC UPA_PDA_CSC_Kauf2023 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC Press |
record_format | marc |
series2 | Cognitive approaches in cloud and edge computing |
spelling | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy First edition Boca Raton, FL ; London ; New York CRC Press [2022] © 2022 1 Online-Ressource (xvi, 275 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Cognitive approaches in cloud and edge computing 1. Security enhanced cloud for Serverless Computing and its applications2. Revealing the Web of Cloud Computing: Threats and Vulnerabilities3. Security and Privacy Provocation of Data in Cloud computing4. Networking Security incitements in Cloud Computing5. Security Concerns of Virtualization in Cloud Computing6. Operational Security agitations in cloud computing7. Secure Data Storage and Retrieval Operations using Attribute-based Encryption for Mobile Cloud Computing8. Deep Dive on Popular Security Models and Strategies of Cloud Computing9. Quantum Computing and Quantum Cryptography10. An Extensive exploration of Privacy and compliance Considerations for hybrid cloud deployments11. Threat Detection and Incident Response in Cloud Security12. The Cyber Artificial Intelligence Platform for Cloud Security13. Enhanced Hybrid and Highly Secure Cryptosystem for Mitigating Security Issues in Cloud Environments Cloud computing TECHNOLOGY / Electronics / General Kumar, T. Ananth edt Samuel, T. S. Arun edt Samuel, R. Dinesh Jackson edt Niranjanamurthy, M. (DE-588)1274469287 edt Erscheint auch als Druck-Ausgabe, Hardcover 978-1-032-11355-5 Erscheint auch als Druck-Ausgabe, Paperback 978-1-032-11426-2 https://doi.org/10.1201/9781003219880 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Privacy and security challenges in cloud computing a holistic approach |
title | Privacy and security challenges in cloud computing a holistic approach |
title_auth | Privacy and security challenges in cloud computing a holistic approach |
title_exact_search | Privacy and security challenges in cloud computing a holistic approach |
title_exact_search_txtP | Privacy and security challenges in cloud computing a holistic approach |
title_full | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_fullStr | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_full_unstemmed | Privacy and security challenges in cloud computing a holistic approach edited by T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy |
title_short | Privacy and security challenges in cloud computing |
title_sort | privacy and security challenges in cloud computing a holistic approach |
title_sub | a holistic approach |
url | https://doi.org/10.1201/9781003219880 |
work_keys_str_mv | AT kumartananth privacyandsecuritychallengesincloudcomputingaholisticapproach AT samueltsarun privacyandsecuritychallengesincloudcomputingaholisticapproach AT samuelrdineshjackson privacyandsecuritychallengesincloudcomputingaholisticapproach AT niranjanamurthym privacyandsecuritychallengesincloudcomputingaholisticapproach |