Bültmann & Gerriets
Cloud Security
Concepts, Applications and Perspectives
von Brij B Gupta
Verlag: CRC Press
Gebundene Ausgabe
ISBN: 978-0-367-40715-5
Erschienen am 26.05.2021
Sprache: Englisch
Format: 234 mm [H] x 156 mm [B] x 16 mm [T]
Gewicht: 540 Gramm
Umfang: 258 Seiten

Preis: 232,50 €
keine Versandkosten (Inland)


Jetzt bestellen und voraussichtlich ab dem 5. Oktober in der Buchhandlung abholen.

Der Versand innerhalb der Stadt erfolgt in Regel am gleichen Tag.
Der Versand nach außerhalb dauert mit Post/DHL meistens 1-2 Tage.

klimaneutral
Der Verlag produziert nach eigener Angabe noch nicht klimaneutral bzw. kompensiert die CO2-Emissionen aus der Produktion nicht. Daher übernehmen wir diese Kompensation durch finanzielle Förderung entsprechender Projekte. Mehr Details finden Sie in unserer Klimabilanz.
Klappentext
Biografische Anmerkung
Inhaltsverzeichnis

Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.



Brij B. Gupta received a PhD degree from Indian Institute of Technology Roorkee, India. In 2009, he was selected for the Canadian Commonwealth Scholarship awarded by the Government of Canada. He published more than 250 research papers in International Journals and Conferences of high repute. At present, Dr. Gupta is working as an Assistant Professor with National Institute of Technology, Kurukshetra, India. His research interest includes Information Security, Cyber Security, Cloud Computing, Web Securit, and Phishing.



Secured IoT devices management in Cloud-Fog Environment using Blockchain. Integrating Cloud and Health Informatics: Approaches, Applications and Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP. Explicating Fog Computing: Key Research Challenges and Solutions. Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems. Active Forgery Detection in Grayscale Images using CRC-8based Fragile Watermarking. Android Malware Classification using Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things. An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics. Identifying and Mitigating Against XSS Attacks in Web Applications. Statistical Analysis Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud based Security Analysis in Body Area Network for Health Care Applications. Fog Robotics: A New Perspective for Cloud-based Robots.


andere Formate