Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Confidential computing = hardware ba...
~
Garcia Diaz, Vicente.
Linked to FindBook
Google Book
Amazon
博客來
Confidential computing = hardware based memory protection /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Confidential computing/ edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte.
Reminder of title:
hardware based memory protection /
other author:
Garcia Diaz, Vicente.
Published:
Singapore :Springer Nature Singapore : : 2022.,
Description:
ix, 215 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-981-19-3045-4
ISBN:
9789811930454
Confidential computing = hardware based memory protection /
Confidential computing
hardware based memory protection /[electronic resource] :edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte. - Singapore :Springer Nature Singapore :2022. - ix, 215 p. :ill. (chiefly color), digital ;24 cm. - Advanced technologies and societal change,2191-6861. - Advanced technologies and societal change..
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear-not encrypted or otherwise protected-in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server's hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments-from on-premise to public cloud to edge-organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other's data.
ISBN: 9789811930454
Standard No.: 10.1007/978-981-19-3045-4doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / C65 2022
Dewey Class. No.: 005.8
Confidential computing = hardware based memory protection /
LDR
:03990nmm a2200337 a 4500
001
2303879
003
DE-He213
005
20220923103708.0
006
m d
007
cr nn 008maaau
008
230409s2022 si s 0 eng d
020
$a
9789811930454
$q
(electronic bk.)
020
$a
9789811930447
$q
(paper)
024
7
$a
10.1007/978-981-19-3045-4
$2
doi
035
$a
978-981-19-3045-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C65 2022
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C748 2022
245
0 0
$a
Confidential computing
$h
[electronic resource] :
$b
hardware based memory protection /
$c
edited by Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte.
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
ix, 215 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Advanced technologies and societal change,
$x
2191-6861
505
0
$a
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
520
$a
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear-not encrypted or otherwise protected-in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server's hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments-from on-premise to public cloud to edge-organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other's data.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Cloud Computing.
$3
3231328
650
2 4
$a
Quantum Computing.
$3
1620399
650
2 4
$a
Sustainability.
$3
1029978
650
2 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Garcia Diaz, Vicente.
$3
3605561
700
1
$a
Rincon Aponte, Gloria Jeanette.
$3
3605562
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advanced technologies and societal change.
$3
1569208
856
4 0
$u
https://doi.org/10.1007/978-981-19-3045-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9445428
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C65 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login