|
Showing 1 - 2 of
2 matches in All Departments
Businesses constantly face online hacking threats or security
breaches in their online mainframe that expose sensitive
information to the wrong audience. Companies look to store their
data in a separate location, distancing the availability of the
information and reducing the risk of data breaches. Modern
organizations need to remain vigilant against insider attacks,
cloud computing risks, and security flaws within their mainframe.
Detection and Mitigation of Insider Attacks in a Cloud
Infrastructure: Emerging Research and Opportunities is an essential
reference source that discusses maintaining a secure management of
sensitive data, and intellectual property and provides a robust
security algorithm on consumer data. Featuring research on topics
such as public cryptography, security principles, and trustworthy
computing, this book is ideally designed for IT professionals,
business managers, researchers, students, and professionals seeking
coverage on preventing and detecting the insider attacks using
trusted cloud computing techniques.
Businesses constantly face online hacking threats or security
breaches in their online mainframe that expose sensitive
information to the wrong audience. Companies look to store their
data in a separate location, distancing the availability of the
information and reducing the risk of data breaches. Modern
organizations need to remain vigilant against insider attacks,
cloud computing risks, and security flaws within their mainframe.
Detection and Mitigation of Insider Attacks in a Cloud
Infrastructure: Emerging Research and Opportunities is an essential
reference source that discusses maintaining a secure management of
sensitive data, and intellectual property and provides a robust
security algorithm on consumer data. Featuring research on topics
such as public cryptography, security principles, and trustworthy
computing, this book is ideally designed for IT professionals,
business managers, researchers, students, and professionals seeking
coverage on preventing and detecting the insider attacks using
trusted cloud computing techniques.
|
|