BOOKS - Improving Security, Privacy, and Trust in Cloud Computing
Improving Security, Privacy, and Trust in Cloud Computing - Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal 2024 PDF | EPUB IGI Global BOOKS
ECO~15 kg CO²

1 TON

Views
766264

 
Improving Security, Privacy, and Trust in Cloud Computing
Author: Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal
Year: 2024
Pages: 319
Format: PDF | EPUB
File size: 26.0 MB
Language: ENG



''

You may also be interested in:

Improving Security, Privacy, and Trust in Cloud Computing
Improving Security, Privacy, and Trust in Cloud Computing
Trust, Security and Privacy for Big Data
Botnets Architectures, Countermeasures, and Challenges (Series in Security, Privacy and Trust)
Cross-Site Scripting Attacks Classification, Attack and Countermeasures (Security, Privacy and Trust in Mobile Communications)
Cryptography for Security and Privacy in Cloud Computing (Information Security and Privacy)
Privacy and Security for Large Language Models Hands-On Privacy-Preserving Techniques for Personalized AI (Early Release)
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats
Lightweight Hardware Security and Physically Unclonable Functions Improving Security of Constrained IoT Devices
Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Advances in Information Security, Privacy, and Ethics)
Practical Data Privacy: Enhancing Privacy and Security in Data
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Handbook of Research on Intelligent Data Processing and Information Security Systems (Advances in Information Security, Privacy, and Ethics)
Information Privacy Engineering and Privacy by Design Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
Mobile Security and Privacy
Security and Privacy in Web 3.0
Security and Privacy in Web 3.0
Security and Privacy in the Digital Era
Circuits and Systems for Security and Privacy
5G Wireless Network Security and Privacy
Security and Privacy for 6G Massive IoT
5G Wireless Network Security and Privacy
IoT Security and Privacy Paradigm
Beyond the Algorithm: AI, Security, Privacy, and Ethics
Security and Privacy in the Internet of Things
Privacy, Security, and Cyberspace, Revised Edition
Security, Privacy, and Digital Forensics in the Cloud
Beyond the Algorithm AI, Security, Privacy, and Ethics (Final)
Beyond the Algorithm AI, Security, Privacy, and Ethics (Final)
Security and Privacy in Smart Sensor Networks
Policy as Code: Improving Cloud Native Security
Policy as Code Improving Cloud Native Security
Improving Information Security Practices Through Computational Intelligence
Policy as Code Improving Cloud Native Security
Beyond the Algorithm AI, Security, Privacy, and Ethics (Early Release)
Of Privacy and Power: The Transatlantic Struggle over Freedom and Security