Cloud Security : Concepts, Applications and Perspectives (Cyber Ecosystem and Security)

個数:
電子版価格
¥13,931
  • 電子版あり

Cloud Security : Concepts, Applications and Perspectives (Cyber Ecosystem and Security)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 250 p.
  • 言語 ENG
  • 商品コード 9780367722968
  • DDC分類 005.8

Full Description

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them.

Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain.

This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Contents

Secured IoT devices management in Cloud-Fog Environment using Blockchain. Integrating Cloud and Health Informatics: Approaches, Applications and Challenges. A Flow Based Anomaly Detection System for Slow DDoS Attack on HTTP. Explicating Fog Computing: Key Research Challenges and Solutions. Comparison of Various Techniques for Emergency Vehicle Detection using Audio Processing. Cryptanalysis of a Robust ECC Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. Cryptanalysis of 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. Self-Stabilizing Attack Graph Model for Intrusion Detection in Cyber Physical Systems. Active Forgery Detection in Grayscale Images using CRC-8based Fragile Watermarking. Android Malware Classification using Ensemble Classifiers. Provably Secure Lightweight Key Policy Attribute Based Encryption for Internet of Things. An Improved Two Factor Authentication Scheme for TMIS based on Dual Biometrics. Identifying and Mitigating Against XSS Attacks in Web Applications. Statistical Analysis Tests Comparison for DES, AES and Rubik's Cube Encryption Algorithms. Cloud based Security Analysis in Body Area Network for Health Care Applications. Fog Robotics: A New Perspective for Cloud-based Robots.

最近チェックした商品