語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection and mitigation of insider ...
~
Gunasekhar, T., (1990-)
Detection and mitigation of insider attacks in a cloud infrastructure[electronic resource] :emerging research and opportunities /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
004.67/82
書名/作者:
Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities // by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao.
作者:
Gunasekhar, T.,
其他作者:
Rao, K. Thirupathi,
出版者:
Hershey, Pennsylvania : : IGI Global,, [2019]
面頁冊數:
1 online resource (xxxvi, 113 p.)
標題:
Cloud computing - Security measures.
標題:
Virtual computer systems - Security measures.
標題:
Computer crimes - Prevention.
ISBN:
9781522579250 (e-book)
ISBN:
9781522579243 (hardback)
書目註:
Includes bibliographical references and index.
內容註:
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
摘要、提要註:
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--Provided by publisher.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
Detection and mitigation of insider attacks in a cloud infrastructure[electronic resource] :emerging research and opportunities /
Gunasekhar, T.,1990-
Detection and mitigation of insider attacks in a cloud infrastructure
emerging research and opportunities /[electronic resource] :by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxxvi, 113 p.)
Includes bibliographical references and index.
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
Restricted to subscribers or individual electronic text purchasers.
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--Provided by publisher.
ISBN: 9781522579250 (e-book)Subjects--Topical Terms:
412456
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .G86 2019e
Dewey Class. No.: 004.67/82
Detection and mitigation of insider attacks in a cloud infrastructure[electronic resource] :emerging research and opportunities /
LDR
:01854nmm a2200277 a 4500
001
513161
003
IGIG
005
20191028085929.0
006
m o d
007
cr cn
008
210929s2019 pau fob 001 0 eng d
010
$z
2018038726
020
$a
9781522579250 (e-book)
020
$a
9781522579243 (hardback)
035
$a
(OCoLC)1083341921
035
$a
1081021249
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.G86 2019e
082
0 0
$a
004.67/82
$2
23
100
1
$a
Gunasekhar, T.,
$d
1990-
$e
author.
$3
734485
245
1 0
$a
Detection and mitigation of insider attacks in a cloud infrastructure
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxxvi, 113 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
412456
650
0
$a
Virtual computer systems
$x
Security measures.
$3
445943
650
0
$a
Computer crimes
$x
Prevention.
$3
405109
700
1
$a
Rao, K. Thirupathi,
$e
author.
$3
734486
700
1
$a
Kiran, P. Sai,
$e
author.
$3
734487
700
1
$a
Krishna Reddy, V.,
$e
author.
$3
734488
700
1
$a
Rao, B. Thirumala,
$e
author.
$3
734489
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入