EUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Khiyal Malik Sikander HayatProf. Dr. Malik Sikander Hayat Khiyal is currently a Professor of Faculty of Computer Science, Preston University, Islamabad. He remained Chairman Department of Computer Sciences and Software Engineering in. Codice articolo 509616035
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. The aim of this study is to define an effective security policy for companies using cloud computing. In a cloud situation, policy are neither likely to be up to date nor likely to be effective, due to the constant change in attack threats. Security threats and vulnerability have been giving credit to attackers to access the information of different users. First, this study identifies security challenges, companies need to guard against it in order to define an effective security policy with the corresponding existing solutions. Second, one of the main contributions of this study is a security policy model. The model contains five elements Security Goals, Policies, Security Mechanisms, Security Requirements and Security Challenges. Security challenges addressed in security policy by passing through the steps exist in the security policy model. Generally, the model is used to define an effective security policy. 88 pp. Englisch. Codice articolo 9783330353282
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. The aim of this study is to define an effective security policy for companies using cloud computing. In a cloud situation, policy are neither likely to be up to date nor likely to be effective, due to the constant change in attack threats. Security threats and vulnerability have been giving credit to attackers to access the information of different users. First, this study identifies security challenges, companies need to guard against it in order to define an effective security policy with the corresponding existing solutions. Second, one of the main contributions of this study is a security policy model. The model contains five elements Security Goals, Policies, Security Mechanisms, Security Requirements and Security Challenges. Security challenges addressed in security policy by passing through the steps exist in the security policy model. Generally, the model is used to define an effective security policy. Codice articolo 9783330353282
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -Cloud computing offers a variety of services like computational platform, computational power, storage and applications by means of the web. The cloud services have brought business supporting technology that attracts different companies around the globe. The aim of this study is to define an effective security policy for companies using cloud computing. In a cloud situation, policy are neither likely to be up to date nor likely to be effective, due to the constant change in attack threats. Security threats and vulnerability have been giving credit to attackers to access the information of different users. First, this study identifies security challenges, companies need to guard against it in order to define an effective security policy with the corresponding existing solutions. Second, one of the main contributions of this study is a security policy model. The model contains five elements Security Goals, Policies, Security Mechanisms, Security Requirements and Security Challenges. Security challenges addressed in security policy by passing through the steps exist in the security policy model. Generally, the model is used to define an effective security policy.Books on Demand GmbH, Überseering 33, 22297 Hamburg 88 pp. Englisch. Codice articolo 9783330353282
Quantità: 2 disponibili