Showing 1 - 10 of 303
"This book provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727547
Cloud computing overview / Yushi Shen, Yale Li, Ling Wu, Shaofeng Liu, Qian Wen -- Main components of cloud computing / Yushi Shen, Yale Li, Ling Wu, Shaofeng Liu, Qian Wen -- Cloud infrastructure: virtualization / Yushi Shen, Yale Li, Ling Wu, Shaofeng Liu, Qian Wen -- Trusted cloud initiative...
Persistent link: https://www.econbiz.de/10011727903
"This book compiles the research and views of cloud computing from various individuals around the world, detailing cloud security, regulatory and industry compliance, and trust building in the cloud"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727970
"This book brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field by highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of...
Persistent link: https://www.econbiz.de/10011728234
compliance of IT security solutions: a structured approach using diffusion of innovations theory / Heiko Rossnagel and Jan …
Persistent link: https://www.econbiz.de/10011727317
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011726540
, Abdelmalek Amine -- Applying game theory in securing wireless sensor networks by minimizing battery usage / Mehran Asadi, Afrand …
Persistent link: https://www.econbiz.de/10011727900
Section 1. Organizational Security -- 1. Responsibilities and Liabilities with respect to catastrophes -- 2. The Complex New World of Information Security -- 3. Employee Surveillance Based on Free Text Detection of Keystroke Dynamics -- 4. E-Risk Insurance Product Design: A Copula Based Bayesian...
Persistent link: https://www.econbiz.de/10011729017
"This book offers over 400 accounts from a wide range of specific research efforts on methodologies, tools, and architectures for complex distributed systems that address the practical issues of performance guarantees, timed execution, real-time management of resources, synchronized...
Persistent link: https://www.econbiz.de/10011727144
1. Harnessing the cloud for mobile social networking applications / Juwel Rana ... [et al.] -- 2. Balanced job scheduling based on ant algorithm for grid network / Nikolaos Preve -- 3. Evaluating heuristics for scheduling dependent jobs in grid computing environments / Geoffrey Falzon and...
Persistent link: https://www.econbiz.de/10011727286