Bültmann & Gerriets
Cloud Security
Concepts, Applications and Perspectives
von Brij B. Gupta
Verlag: Taylor & Francis
E-Book / PDF
Kopierschutz: kein Kopierschutz


Speicherplatz: 7 MB
Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-1-000-35730-1
Auflage: 1. Auflage
Erschienen am 25.05.2021
Sprache: Englisch
Umfang: 258 Seiten

Preis: 83,99 €

Klappentext
Biografische Anmerkung
Inhaltsverzeichnis

Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.



Brij B. Gupta received a PhD degree from Indian Institute of Technology Roorkee, India. In 2009, he was selected for the Canadian Commonwealth Scholarship awarded by the Government of Canada. He published more than 250 research papers in International Journals and Conferences of high repute. At present, Dr. Gupta is working as an Assistant Professor with National Institute of Technology, Kurukshetra, India. His research interest includes Information Security, Cyber Security, Cloud Computing, Web Securit, and Phishing.



Secured IoT devices management in Cloud-Fog Environment using Blockchain. Integrating Cloud and Health Informatics: Approaches, Applications and Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP. Explicating Fog Computing: Key Research Challenges and Solutions. Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems. Active Forgery Detection in Grayscale Images using CRC-8based Fragile Watermarking. Android Malware Classification using Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things. An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics. Identifying and Mitigating Against XSS Attacks in Web Applications. Statistical Analysis Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud based Security Analysis in Body Area Network for Health Care Applications. Fog Robotics: A New Perspective for Cloud-based Robots.


andere Formate