000 | 02797nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-3-319-41411-9 | ||
003 | DE-He213 | ||
005 | 20200420220213.0 | ||
007 | cr nn 008mamaa | ||
008 | 160714s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319414119 _9978-3-319-41411-9 |
||
024 | 7 |
_a10.1007/978-3-319-41411-9 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aAlani, Mohammed M. _eauthor. |
|
245 | 1 | 0 |
_aElements of Cloud Computing Security _h[electronic resource] : _bA Survey of Key Practicalities / _cby Mohammed M. Alani. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXI, 55 p. 7 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aWhat is the Cloud? -- About Cloud Security -- Security Threats in Cloud Computing -- Security Attacks in Cloud Computing -- General Cloud Security Recommendations. | |
520 | _aThis book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aData Storage Representation. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319414102 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-41411-9 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c51398 _d51398 |