Analyzing and mitigating security risks in cloud computing:
"In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefit...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2024.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- |
Beschreibung: | 18 PDFs (270 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369332504 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00335109 | ||
003 | IGIG | ||
005 | 20240301134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240301s2024 pau fob 001 0 eng d | ||
020 | |a 9798369332504 |q PDF | ||
020 | |z 9798369332498 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-3249-8 |2 doi | |
035 | |a (CaBNVSL)slc00005628 | ||
035 | |a (OCoLC)1424888561 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .A53 2024e | |
082 | 7 | |a 004.6782 |2 23 | |
245 | 0 | 0 | |a Analyzing and mitigating security risks in cloud computing |c Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2024. | |
300 | |a 18 PDFs (270 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/01/2024). | ||
650 | 0 | |a Artificial intelligence. | |
650 | 0 | |a Cloud computing |x Security measures. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Agarwal, Sanyam, |e editor. | |
700 | 1 | |a Goel, Pawan Kumar, |e editor. | |
700 | 1 | |a Pandey, Hari Mohan, |e editor. | |
700 | 1 | |a Singhal, Amit, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369332498 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00335109 |
---|---|
_version_ | 1816797088154910721 |
adam_text | |
any_adam_object | |
author2 | Agarwal, Sanyam Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit |
author2_role | edt edt edt edt |
author2_variant | s a sa p k g pk pkg h m p hm hmp a s as |
author_facet | Agarwal, Sanyam Goel, Pawan Kumar Pandey, Hari Mohan Singhal, Amit |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .A53 2024e |
callnumber-search | QA76.585 .A53 2024e |
callnumber-sort | QA 276.585 A53 42024E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. |
ctrlnum | (CaBNVSL)slc00005628 (OCoLC)1424888561 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03950nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00335109</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240301134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240301s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369332504</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369332498</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-3249-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005628</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424888561</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.A53 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Analyzing and mitigating security risks in cloud computing </subfield><subfield code="c">Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">18 PDFs (270 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/01/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Sanyam,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goel, Pawan Kumar,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pandey, Hari Mohan,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singhal, Amit,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369332498</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00335109 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:52:00Z |
institution | BVB |
isbn | 9798369332504 |
language | English |
oclc_num | 1424888561 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 18 PDFs (270 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global, |
record_format | marc |
spelling | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2024. 18 PDFs (270 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. Restricted to subscribers or individual electronic text purchasers. "In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing issue arises -- the persistent concerns of security, privacy, and trust in cloud environments. Organizations find themselves at a crossroads, caught between the immense benefits of cloud adoption and the escalating challenges of safeguarding sensitive data and maintaining user trust. The need for a comprehensive and practical guide to navigate these intricate landscapes has never been more critical.Analyzing and Mitigating Security Risks in Cloud Computing is a groundbreaking guidebook tailored to address the very challenges that organizations face in securing their cloud infrastructures. With a focus on real-world examples, case studies, and industry best practices, the book equips its readers with actionable insights and tools to fortify their cloud security posture. From understanding the fundamentals of cloud computing to addressing emerging trends and implementing robust security strategies, the book serves as a holistic solution to bridge the knowledge gap and empower professionals at every level."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/01/2024). Artificial intelligence. Cloud computing Security measures. Electronic books. Agarwal, Sanyam, editor. Goel, Pawan Kumar, editor. Pandey, Hari Mohan, editor. Singhal, Amit, editor. IGI Global, publisher. Print version: 9798369332498 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8 Volltext |
spellingShingle | Analyzing and mitigating security risks in cloud computing Chapter 1. Securing the cloud: understanding and mitigating data breaches and insider attacks in cloud computing environments -- Chapter 2. Security automation and orchestration in the cloud -- Chapter 3. Quantum key distribution and authentication in the cloud for internet of things -- Chapter 4. A quantitative study on cloud computing in the UAE: identifying and addressing adoption barriers -- Chapter 5. Fortifying cloud storage using hash code -- Chapter 6. Impact of artificial intelligence (AI) and machine learning (ML) on cloud security -- Chapter 7. Mitigating phishing threats in unmanned aircraft systems (UAS) through multi-stage defense strategies -- Chapter 8. Threat modeling and risk analysis for cloud deployments -- Chapter 9. Service level agreements (SLAs) and their role in establishing trust -- Chapter 10. Threat landscape and common security challenges in cloud environments -- Chapter 11. Strengthening security, privacy, and trust in artificial intelligence drones for smart cities. Artificial intelligence. Cloud computing Security measures. |
title | Analyzing and mitigating security risks in cloud computing |
title_auth | Analyzing and mitigating security risks in cloud computing |
title_exact_search | Analyzing and mitigating security risks in cloud computing |
title_full | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_fullStr | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_full_unstemmed | Analyzing and mitigating security risks in cloud computing Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal, editors. |
title_short | Analyzing and mitigating security risks in cloud computing |
title_sort | analyzing and mitigating security risks in cloud computing |
topic | Artificial intelligence. Cloud computing Security measures. |
topic_facet | Artificial intelligence. Cloud computing Security measures. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-3249-8 |
work_keys_str_mv | AT agarwalsanyam analyzingandmitigatingsecurityrisksincloudcomputing AT goelpawankumar analyzingandmitigatingsecurityrisksincloudcomputing AT pandeyharimohan analyzingandmitigatingsecurityrisksincloudcomputing AT singhalamit analyzingandmitigatingsecurityrisksincloudcomputing AT igiglobal analyzingandmitigatingsecurityrisksincloudcomputing |