Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detection and mitigation of insider ...
~
Gunasekhar, T., (1990-)
Linked to FindBook
Google Book
Amazon
博客來
Detection and mitigation of insider attacks in a cloud infrastructure = emerging research and opportunities /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detection and mitigation of insider attacks in a cloud infrastructure/ by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao.
Reminder of title:
emerging research and opportunities /
Author:
Gunasekhar, T.,
other author:
Rao, K. Thirupathi,
Published:
Hershey, Pennsylvania :IGI Global, : [2019],
Description:
1 online resource (xxxvi, 113 p.)
[NT 15003449]:
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
Subject:
Cloud computing - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
ISBN:
9781522579250 (e-book)
Detection and mitigation of insider attacks in a cloud infrastructure = emerging research and opportunities /
Gunasekhar, T.,1990-
Detection and mitigation of insider attacks in a cloud infrastructure
emerging research and opportunities /[electronic resource] :by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xxxvi, 113 p.)
Includes bibliographical references and index.
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
Restricted to subscribers or individual electronic text purchasers.
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--Provided by publisher.
ISBN: 9781522579250 (e-book)Subjects--Topical Terms:
1375313
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .G86 2019e
Dewey Class. No.: 004.67/82
Detection and mitigation of insider attacks in a cloud infrastructure = emerging research and opportunities /
LDR
:01854nmm 2200277 a 4500
001
2184005
003
IGIG
005
20191028085929.0
006
m o d
007
cr cn
008
191225s2019 pau fob 001 0 eng d
010
$z
2018038726
020
$a
9781522579250 (e-book)
020
$a
9781522579243 (hardback)
035
$a
(OCoLC)1083341921
035
$a
1081021249
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.585
$b
.G86 2019e
082
0 0
$a
004.67/82
$2
23
100
1
$a
Gunasekhar, T.,
$d
1990-
$e
author.
$3
3395736
245
1 0
$a
Detection and mitigation of insider attacks in a cloud infrastructure
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, and B. Thirumala Rao.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xxxvi, 113 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Security architecture of cloud computing -- Chapter 2. Trusted cloud computing -- Chapter 3. A Survey on insider attacks in IAAS-based cloud -- Chapter 4. Security flaws and design issues in cloud infrastructure -- Chapter 5. Trustworthy framework for insider attack prevention and detection -- Chapter 6. Results and discussions.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book looks at the security vulnerabilities associated with consumer virtual machines. It focuses on crucial challenge of ensuring the data confidentiality and integrity for the arbitrary software execution of consumer virtual machines. It also contains an empirical method to accumulate evidences of security flaws in existence methods and implemented a prototype to prevent and detect attacks"--Provided by publisher.
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
650
0
$a
Virtual computer systems
$x
Security measures.
$3
1458780
650
0
$a
Computer crimes
$x
Prevention.
$3
819286
700
1
$a
Rao, K. Thirupathi,
$e
author.
$3
3395737
700
1
$a
Kiran, P. Sai,
$e
author.
$3
3395738
700
1
$a
Krishna Reddy, V.,
$e
author.
$3
3395739
700
1
$a
Rao, B. Thirumala,
$e
author.
$3
3395740
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9371534
電子資源
11.線上閱覽_V
電子書
EB QA76.585 .G86 2019e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login