Analyzing and mitigating security risks in cloud computing:
"In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefit...
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2024.
|
Subjects: | |
Online Access: | DE-862 DE-863 |
Summary: | "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- |
Physical Description: | 18 PDFs (270 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 9798369332504 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00335109 | ||
003 | IGIG | ||
005 | 20240301134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240301s2024 pau fob 001 0 eng d | ||
020 | |a 9798369332504 |q PDF | ||
020 | |z 9798369332498 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-3249-8 |2 doi | |
035 | |a (CaBNVSL)slc00005628 | ||
035 | |a (OCoLC)1424888561 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .A53 2024e | |
082 | 7 | |a 004.6782 |2 23 | |
245 | 0 | 0 | |a Analyzing and mitigating security risks in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2024. | |
300 | |a 18 PDFs (270 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/01/2024). | ||
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Cloud computing |x Security measures. | |
653 | |a Authentication and Authorization Mechanisms. | ||
653 | |a Benefits and Challenges of Cloud Adoption. | ||
653 | |a Building a Secure Cloud Strategy. | ||
653 | |a Case Studies and Practical Examples. | ||
653 | |a Cloud Governance Frameworks. | ||
653 | |a Cloud-Native Security Solutions. | ||
653 | |a Compliance and Governance in the Cloud. | ||
653 | |a Data Encryption and Access Controls. | ||
653 | |a Detecting and Responding to Security Incidents. | ||
653 | |a Digital Forensics in Cloud Environments. | ||
653 | |a Emerging Trends in Cloud Computing. | ||
653 | |a Ensuring Data Security in the Cloud. | ||
653 | |a Evaluating Cloud Service Providers. | ||
653 | |a Fundamentals of Cloud Computing. | ||
653 | |a Identity and Access Management in the Cloud. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Agarwal, Sanyam |d 1971- |e editor. | |
700 | 1 | |a Goel, Pawan Kumar |e editor. | |
700 | 1 | |a Pandey, Hari Mohan |e editor. | |
700 | 1 | |a Singhal, Amit |d 1979- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369332498 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00335109 |
---|---|
_version_ | 1826942603121131520 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Sanyam 1971- Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit 1979- |
author2_role | edt edt edt edt |
author2_variant | s a sa p k g pk pkg h m p hm hmp a s as |
author_facet | Agarwal, Sanyam 1971- Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit 1979- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .A53 2024e |
callnumber-search | QA76.585 .A53 2024e |
callnumber-sort | QA 276.585 A53 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. |
ctrlnum | (CaBNVSL)slc00005628 (OCoLC)1424888561 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04773nam a2200649 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00335109</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240301134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240301s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369332504</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369332498</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-3249-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424888561</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.A53 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Analyzing and mitigating security risks in cloud computing </subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">18 PDFs (270 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/01/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Authentication and Authorization Mechanisms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Benefits and Challenges of Cloud Adoption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Building a Secure Cloud Strategy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Case Studies and Practical Examples.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Governance Frameworks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud-Native Security Solutions.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Compliance and Governance in the Cloud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Encryption and Access Controls.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Detecting and Responding to Security Incidents.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital Forensics in Cloud Environments.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Emerging Trends in Cloud Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ensuring Data Security in the Cloud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Evaluating Cloud Service Providers.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fundamentals of Cloud Computing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Identity and Access Management in the Cloud.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam</subfield><subfield code="d">1971-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit</subfield><subfield code="d">1979-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369332498</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00335109 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:38Z |
institution | BVB |
isbn | 9798369332504 |
language | English |
oclc_num | 1424888561 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 18 PDFs (270 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2024. 18 PDFs (270 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. Restricted to subscribers or individual electronic text purchasers. "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/01/2024). Artificial intelligence. Cloud computing Security measures. Authentication and Authorization Mechanisms. Benefits and Challenges of Cloud Adoption. Building a Secure Cloud Strategy. Case Studies and Practical Examples. Cloud Governance Frameworks. Cloud-Native Security Solutions. Compliance and Governance in the Cloud. Data Encryption and Access Controls. Detecting and Responding to Security Incidents. Digital Forensics in Cloud Environments. Emerging Trends in Cloud Computing. Ensuring Data Security in the Cloud. Evaluating Cloud Service Providers. Fundamentals of Cloud Computing. Identity and Access Management in the Cloud. Electronic books. Agarwal, Sanyam 1971- editor. Goel, Pawan Kumar editor. Pandey, Hari Mohan editor. Singhal, Amit 1979- editor. IGI Global, publisher. Print version: 9798369332498 |
spellingShingle | Analyzing and mitigating security risks in cloud computing Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. Artificial intelligence. Cloud computing Security measures. |
title | Analyzing and mitigating security risks in cloud computing |
title_auth | Analyzing and mitigating security risks in cloud computing |
title_exact_search | Analyzing and mitigating security risks in cloud computing |
title_full | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_fullStr | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_full_unstemmed | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_short | Analyzing and mitigating security risks in cloud computing |
title_sort | analyzing and mitigating security risks in cloud computing |
topic | Artificial intelligence. Cloud computing Security measures. |
topic_facet | Artificial intelligence. Cloud computing Security measures. Electronic books. |
work_keys_str_mv | AT agarwalsanyam analyzingandmitigatingsecurityrisksincloudcomputing AT goelpawankumar analyzingandmitigatingsecurityrisksincloudcomputing AT pandeyharimohan analyzingandmitigatingsecurityrisksincloudcomputing AT singhalamit analyzingandmitigatingsecurityrisksincloudcomputing AT igiglobal analyzingandmitigatingsecurityrisksincloudcomputing |