Convergence of cybersecurity and clo...
Goundar, Sam.

Linked to FindBook      Google Book      Amazon      博客來     
  • Convergence of cybersecurity and cloud computing
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Convergence of cybersecurity and cloud computing/ J. Avanija, Sam Goundar, Reddy Madhavi Konduru, editors.
    other author: Goundar, Sam.
    Published: Hershey, Pennsylvania :IGI Global, : 2025.,
    Description: 1 online resource (xxxi, 670 p.)
    [NT 15003449]: Preface -- Chapter 1. Taxonomy of Cyber Security and Cloud Computing -- Chapter 2. Issues, Opportunities, and Limitations on the Convergence of Cybersecurity and Cloud Computing -- Chapter 3. Applications of the Convergence of CyberSecurity and Cloud Computing -- Chapter 4. The Convergence of Cybersecurity and Cloud Computing -- Chapter 5. Integrating Federated Learning for Edge Intelligence in Cybersecurity and Cloud Computing -- Chapter 6. Exploring the Synergy of Blockchain and Digital Finance for Enhancing Trust in a Cloud-Enabled Economy -- Chapter 7. Secured and Privacy-Preserved Aggregation of Data in Edge Computing Using Blockchain-Based Secured Aggregation (BSA) -- Chapter 8. A Dynamic Cybersecurity Framework for Energy-Efficient Internet of Things -- Chapter 9. A Systematic Security Analysis of Existing Sybil Attack-Resilient Defensive Methodologies in Blockchain Network -- Chapter 10. A Hybrid Technique to Secure Logistics Information Through Blockchain and NTRUEncrypt -- Chapter 11. A Research Based on Data Security and Privacy in Cloud Computing -- Chapter 12. AI-Driven Threat Detection in Cloud Environments -- Chapter 13. Benefits and Challenges of Metaverse in Healthcare Industry -- Chapter 14. Cutting-Edge Approaches to Data Protection and Encryption in Cloud Computing Security -- Chapter 15. Cybersecurity Challenges in Edge and Fog Computing Within Cloud Ecosystems -- Chapter 16. Cybersecurity, Cloud Computing, Edge Computing, Cloud Security, Data Protection and Encryption in Cloud Networks -- Chapter 17. Data Protection and Encryption in Cloud Network Security: Security and Privacy in Cloud Network Security -- Chapter 18. Essential Concepts and Strategies for Effective Cybersecurity Defense -- Chapter 19. Ethical Implications and Mitigation Strategies for Public Safety and Security in Smart Cities for Securing Tomorrow -- Chapter 20. Improved Security in MobileCloud Computing Using Modern Cryptographic Approaches -- Chapter 21. Protecting Your Digital Life From Cyber Threats and Vulnerabilities -- Chapter 22. Ransomware Detection Using Ensemble of Deep Learning Models -- Chapter 23. Uncovering Hidden Threats in IoT-Centered Cloud Technology: A Study on Hardware Trojans in Security Prospects -- Chapter 24. Zero Trust Architecture in Cloud Security -- Compilation of References -- About the Contributors -- Index.
    Subject: Cloud computing - Security measures. -
    Online resource: https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6859-6
    ISBN: 9798369368619
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9521095 電子資源 11.線上閱覽_V 電子書 EB QA76.585 .C66 2025eb 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login