Improving security, privacy, and trust in cloud computing:
Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2024]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-898 DE-1050 Volltext |
Zusammenfassung: | Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike. |
Beschreibung: | 1 Online-Ressource (xx, 299 Seiten) Illustrationen |
ISBN: | 9798369314326 |
DOI: | 10.4018/979-8-3693-1431-9 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049587085 | ||
003 | DE-604 | ||
005 | 20240802 | ||
007 | cr|uuu---uuuuu | ||
008 | 240227s2024 xx a||| o|||| 00||| eng d | ||
020 | |a 9798369314326 |9 979-8-3693-1432-6 | ||
024 | 7 | |a 10.4018/979-8-3693-1431-9 |2 doi | |
035 | |a (ZDB-98-IGB)00328093 | ||
035 | |a (OCoLC)1424569212 | ||
035 | |a (DE-599)BVBBV049587085 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
245 | 1 | 0 | |a Improving security, privacy, and trust in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2024] | |
264 | 4 | |c © 2024 | |
300 | |a 1 Online-Ressource (xx, 299 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
520 | |a Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike. | ||
650 | 4 | |a Cloud computing |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
700 | 1 | |a Goel, Pawan Kumar |4 edt | |
700 | 1 | |a Pandey, Hari Mohan |4 edt | |
700 | 1 | |a Singhal, Amit |4 edt | |
700 | 1 | |a Agarwal, Sanyam |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 979-8-3693-1431-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 979-8-3693-4675-4 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-1431-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034931860 | |
966 | e | |u https://doi.org/10.4018/979-8-3693-1431-9 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-1431-9 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-1431-9 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715326330699776 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit Agarwal, Sanyam |
author2_role | edt edt edt edt |
author2_variant | p k g pk pkg h m p hm hmp a s as s a sa |
author_facet | Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit Agarwal, Sanyam |
building | Verbundindex |
bvnumber | BV049587085 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00328093 (OCoLC)1424569212 (DE-599)BVBBV049587085 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/979-8-3693-1431-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049587085</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240802</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369314326</subfield><subfield code="9">979-8-3693-1432-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-1431-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00328093</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424569212</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049587085</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving security, privacy, and trust in cloud computing</subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 299 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">979-8-3693-1431-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">979-8-3693-4675-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-1431-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034931860</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-1431-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-1431-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-1431-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049587085 |
illustrated | Illustrated |
index_date | 2024-07-03T23:32:49Z |
indexdate | 2024-12-17T19:01:35Z |
institution | BVB |
isbn | 9798369314326 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034931860 |
oclc_num | 1424569212 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (xx, 299 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal Hershey PA, USA IGI Global [2024] © 2024 1 Online-Ressource (xx, 299 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. Improving Security, Privacy, and Trust in Cloud Computing unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy, and trust that have come to define its evolution. It aims to equip readers with the insights, knowledge, and practical strategies needed to navigate the intricate realm of cloud computing while safeguarding their most valuable assets. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike. Cloud computing Security measures Computer networks Security measures Computer security Data protection Goel, Pawan Kumar edt Pandey, Hari Mohan edt Singhal, Amit edt Agarwal, Sanyam edt Erscheint auch als Druck-Ausgabe 979-8-3693-1431-9 Erscheint auch als Druck-Ausgabe, Paperback 979-8-3693-4675-4 https://doi.org/10.4018/979-8-3693-1431-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Improving security, privacy, and trust in cloud computing Cloud computing Security measures Computer networks Security measures Computer security Data protection |
title | Improving security, privacy, and trust in cloud computing |
title_auth | Improving security, privacy, and trust in cloud computing |
title_exact_search | Improving security, privacy, and trust in cloud computing |
title_exact_search_txtP | Improving security, privacy, and trust in cloud computing |
title_full | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_fullStr | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_full_unstemmed | Improving security, privacy, and trust in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_short | Improving security, privacy, and trust in cloud computing |
title_sort | improving security privacy and trust in cloud computing |
topic | Cloud computing Security measures Computer networks Security measures Computer security Data protection |
topic_facet | Cloud computing Security measures Computer networks Security measures Computer security Data protection |
url | https://doi.org/10.4018/979-8-3693-1431-9 |
work_keys_str_mv | AT goelpawankumar improvingsecurityprivacyandtrustincloudcomputing AT pandeyharimohan improvingsecurityprivacyandtrustincloudcomputing AT singhalamit improvingsecurityprivacyandtrustincloudcomputing AT agarwalsanyam improvingsecurityprivacyandtrustincloudcomputing |