語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Confidential computing = hardware ba...
~
Garcia Diaz, Vicente.
FindBook
Google Book
Amazon
博客來
Confidential computing = hardware based memory protection /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Confidential computing/ edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte.
其他題名:
hardware based memory protection /
其他作者:
Garcia Diaz, Vicente.
出版者:
Singapore :Springer Nature Singapore : : 2022.,
面頁冊數:
ix, 215 p. :ill. (chiefly color), digital ;24 cm.
內容註:
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-981-19-3045-4
ISBN:
9789811930454
Confidential computing = hardware based memory protection /
Confidential computing
hardware based memory protection /[electronic resource] :edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte. - Singapore :Springer Nature Singapore :2022. - ix, 215 p. :ill. (chiefly color), digital ;24 cm. - Advanced technologies and societal change,2191-6861. - Advanced technologies and societal change..
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear-not encrypted or otherwise protected-in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server's hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments-from on-premise to public cloud to edge-organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other's data.
ISBN: 9789811930454
Standard No.: 10.1007/978-981-19-3045-4doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / C65 2022
Dewey Class. No.: 005.8
Confidential computing = hardware based memory protection /
LDR
:03990nmm a2200337 a 4500
001
2303879
003
DE-He213
005
20220923103708.0
006
m d
007
cr nn 008maaau
008
230409s2022 si s 0 eng d
020
$a
9789811930454
$q
(electronic bk.)
020
$a
9789811930447
$q
(paper)
024
7
$a
10.1007/978-981-19-3045-4
$2
doi
035
$a
978-981-19-3045-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C65 2022
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C748 2022
245
0 0
$a
Confidential computing
$h
[electronic resource] :
$b
hardware based memory protection /
$c
edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte.
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
ix, 215 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Advanced technologies and societal change,
$x
2191-6861
505
0
$a
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
520
$a
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear-not encrypted or otherwise protected-in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server's hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments-from on-premise to public cloud to edge-organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other's data.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Cloud Computing.
$3
3231328
650
2 4
$a
Quantum Computing.
$3
1620399
650
2 4
$a
Sustainability.
$3
1029978
650
2 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Garcia Diaz, Vicente.
$3
3605561
700
1
$a
Rincon Aponte, Gloria Jeanette.
$3
3605562
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advanced technologies and societal change.
$3
1569208
856
4 0
$u
https://doi.org/10.1007/978-981-19-3045-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9445428
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C65 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入