Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings ·
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Security measures --- Distributed processing --- Information Systems.
Choose an application
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: · Describes the important general concepts and principles of security assurance in cloud-based environments · Presents applications and approaches to cloud security that illustrate the current state of the art · Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures · Provides relevant theoretical frameworks and the latest empirical research findings ·
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cloud computing --- computers --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen’s University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Software-defined networking (Computer network technology) --- Computer networks --- Security measures. --- SDN (Computer network technology) --- Software-defined networks (Computer network technology) --- Computer network security --- Network security, Computer --- Security of computer networks --- Cryptology.
Choose an application
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen’s University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- cloud computing --- big data --- informatica --- computerbeveiliging --- computernetwerken
Choose an application
This important and timely text/reference reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: Describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures Examines the applications and implementations that utilize big data in cloud architectures Surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions Identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches Provides relevant theoretical frameworks, empirical research findings, and numerous case studies Discusses real-world applications of algorithms and techniques to address the challenges of big datasets This authoritative volume will be of great interest to researchers, enterprise architects, business analysts, IT infrastructure managers and application developers, who will benefit from the valuable insights offered into the adoption of architectures for big data and cloud computing. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Marcello Trovati serves as a Senior Lecturer in Mathematics, Dr. Richard Hillas a Professor and Head of the Computing and Mathematics Department, Dr. Ashiq Anjum as a Professor of Distributed Computing, Dr. Shao Ying Zhu as a Senior Lecturer in Computing, and Dr. Lu Liu as a Professor of Distributed Computing. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.
Mathematical Statistics --- Mathematics --- Physical Sciences & Mathematics --- Cloud computing. --- Big data. --- Data sets, Large --- Large data sets --- Computer science. --- Computer communication systems. --- Mathematical statistics. --- Computer science --- Computer simulation. --- Computer Science. --- Probability and Statistics in Computer Science. --- Computer Communication Networks. --- Simulation and Modeling. --- Math Applications in Computer Science. --- Mathematics. --- Electronic data processing --- Web services --- Distributed processing --- Data sets --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Statistical methods
Choose an application
This important and timely text/reference reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: Describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures Examines the applications and implementations that utilize big data in cloud architectures Surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions Identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches Provides relevant theoretical frameworks, empirical research findings, and numerous case studies Discusses real-world applications of algorithms and techniques to address the challenges of big datasets This authoritative volume will be of great interest to researchers, enterprise architects, business analysts, IT infrastructure managers and application developers, who will benefit from the valuable insights offered into the adoption of architectures for big data and cloud computing. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Marcello Trovati serves as a Senior Lecturer in Mathematics, Dr. Richard Hillas a Professor and Head of the Computing and Mathematics Department, Dr. Ashiq Anjum as a Professor of Distributed Computing, Dr. Shao Ying Zhu as a Senior Lecturer in Computing, and Dr. Lu Liu as a Professor of Distributed Computing. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.
Operational research. Game theory --- Mathematical statistics --- Mathematics --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- stochastische analyse --- cloud computing --- vormgeving --- informatica --- statistiek --- mineralen (chemie) --- simulaties --- externe fixatie (geneeskunde --- mijnbouw --- informatietechnologie --- wiskunde --- computernetwerken
Listing 1 - 6 of 6 |
Sort by
|