Analyzing and mitigating security risks in cloud computing:
In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of c...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2024]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-898 DE-1050 Volltext |
Zusammenfassung: | In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level. |
Beschreibung: | 1 Online-Ressource (xx, 270 Seiten) Illustrationen |
ISBN: | 9798369332504 |
DOI: | 10.4018/979-8-3693-3249-8 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049645420 | ||
003 | DE-604 | ||
005 | 20240709 | ||
007 | cr|uuu---uuuuu | ||
008 | 240411s2024 xx a||| o|||| 00||| eng d | ||
020 | |a 9798369332504 |9 979-8-3693-3250-4 | ||
024 | 7 | |a 10.4018/979-8-3693-3249-8 |2 doi | |
035 | |a (ZDB-98-IGB)00335109 | ||
035 | |a (OCoLC)1430759699 | ||
035 | |a (DE-599)BVBBV049645420 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 004.6782 | |
245 | 1 | 0 | |a Analyzing and mitigating security risks in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2024] | |
264 | 4 | |c © 2024 | |
300 | |a 1 Online-Ressource (xx, 270 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
520 | |a In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level. | ||
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Cloud computing |x Security measures | |
700 | 1 | |a Goel, Pawan Kumar |4 edt | |
700 | 1 | |a Pandey, Hari Mohan |0 (DE-588)1273477804 |4 edt | |
700 | 1 | |a Singhal, Amit |4 edt | |
700 | 1 | |a Agarwal, Sanyam |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 979-8-3693-3249-8 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-3249-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034988967 | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3249-8 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3249-8 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3249-8 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715328060850176 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit Agarwal, Sanyam |
author2_role | edt edt edt edt |
author2_variant | p k g pk pkg h m p hm hmp a s as s a sa |
author_GND | (DE-588)1273477804 |
author_facet | Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit Agarwal, Sanyam |
building | Verbundindex |
bvnumber | BV049645420 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00335109 (OCoLC)1430759699 (DE-599)BVBBV049645420 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/979-8-3693-3249-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049645420</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240709</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2024 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369332504</subfield><subfield code="9">979-8-3693-3250-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-3249-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00335109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430759699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049645420</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6782</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analyzing and mitigating security risks in cloud computing</subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 270 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan</subfield><subfield code="0">(DE-588)1273477804</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">979-8-3693-3249-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-3249-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034988967</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3249-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3249-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3249-8</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049645420 |
illustrated | Illustrated |
index_date | 2024-07-03T23:39:48Z |
indexdate | 2024-12-17T19:01:37Z |
institution | BVB |
isbn | 9798369332504 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034988967 |
oclc_num | 1430759699 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (xx, 270 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal Hershey PA, USA IGI Global [2024] © 2024 1 Online-Ressource (xx, 270 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level. Artificial intelligence Cloud computing Security measures Goel, Pawan Kumar edt Pandey, Hari Mohan (DE-588)1273477804 edt Singhal, Amit edt Agarwal, Sanyam edt Erscheint auch als Druck-Ausgabe 979-8-3693-3249-8 https://doi.org/10.4018/979-8-3693-3249-8 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Analyzing and mitigating security risks in cloud computing Artificial intelligence Cloud computing Security measures |
title | Analyzing and mitigating security risks in cloud computing |
title_auth | Analyzing and mitigating security risks in cloud computing |
title_exact_search | Analyzing and mitigating security risks in cloud computing |
title_exact_search_txtP | Analyzing and mitigating security risks in cloud computing |
title_full | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_fullStr | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_full_unstemmed | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal |
title_short | Analyzing and mitigating security risks in cloud computing |
title_sort | analyzing and mitigating security risks in cloud computing |
topic | Artificial intelligence Cloud computing Security measures |
topic_facet | Artificial intelligence Cloud computing Security measures |
url | https://doi.org/10.4018/979-8-3693-3249-8 |
work_keys_str_mv | AT goelpawankumar analyzingandmitigatingsecurityrisksincloudcomputing AT pandeyharimohan analyzingandmitigatingsecurityrisksincloudcomputing AT singhalamit analyzingandmitigatingsecurityrisksincloudcomputing AT agarwalsanyam analyzingandmitigatingsecurityrisksincloudcomputing |