000 | 07841cam a2200949 i 4500 | ||
---|---|---|---|
001 | on1076372854 | ||
003 | OCoLC | ||
005 | 20240523125541.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181126t20192019nju ob 001 0 eng | ||
010 | _a 2018056741 | ||
040 |
_aDLC _beng _erda _epn _cDLC _dOCLCO _dOCLCF _dN$T _dEBLCP _dDG1 _dYDX _dOCLCQ _dOTZ _dUMI _dOCLCQ _dCOO _dOCLCQ _dTOH _dHS0 _dBRF _dMM9 _dUKAHL _dVT2 _dOCLCO _dIEEEE _dOCLCQ _dAU@ _dCNCGM _dINARC _dOCLCO _dOCLCL |
||
019 |
_a1084806335 _a1099479110 _a1119557716 _a1124361767 _a1156342207 _a1165222728 _a1166371232 _a1167513351 _a1167588711 _a1180647762 _a1391660771 |
||
020 | _a1119053404 | ||
020 |
_a9781119053378 _q(electronic book) |
||
020 |
_a1119053374 _q(electronic book) |
||
020 |
_a9781119053408 _q(electronic book) |
||
020 |
_a9781119053385 _q(electronic book) |
||
020 |
_a1119053382 _q(electronic book) |
||
020 |
_z9781119053286 _q(hardcover) |
||
020 | _z1119053285 | ||
024 | 7 |
_a10.1002/9781119053385 _2doi |
|
029 | 1 |
_aAU@ _b000065193805 |
|
029 | 1 |
_aCHNEW _b001039228 |
|
029 | 1 |
_aCHVBK _b559026919 |
|
029 | 1 |
_aAU@ _b000065043215 |
|
029 | 1 |
_aAU@ _b000066232590 |
|
029 | 1 |
_aAU@ _b000066532130 |
|
029 | 1 |
_aAU@ _b000067092830 |
|
029 | 1 |
_aAU@ _b000067383252 |
|
035 |
_a(OCoLC)1076372854 _z(OCoLC)1084806335 _z(OCoLC)1099479110 _z(OCoLC)1119557716 _z(OCoLC)1124361767 _z(OCoLC)1156342207 _z(OCoLC)1165222728 _z(OCoLC)1166371232 _z(OCoLC)1167513351 _z(OCoLC)1167588711 _z(OCoLC)1180647762 _z(OCoLC)1391660771 |
||
037 |
_aCL0501000070 _bSafari Books Online |
||
037 |
_a9820795 _bIEEE |
||
042 | _apcc | ||
050 | 1 | 4 |
_aQA76.585 _b.S43 2019 |
072 | 7 |
_aCOM _x013000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x018000 _2bisacsh |
|
072 | 7 |
_aCOM _x067000 _2bisacsh |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x037000 _2bisacsh |
|
072 | 7 |
_aCOM _x052000 _2bisacsh |
|
082 | 0 | 0 |
_a004.67/82 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aSecurity, privacy and digital forensics in the cloud / _cedited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac. |
264 | 1 |
_aHoboken, NJ ; _aSingapore : _bJohn Wiley & Sons, Inc., _c2019. |
|
264 | 4 | _c�2019 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction to the cloud and fundamental security and privacy issues of the cloud / Hassan Takabi, Mohammad GhasemiGol -- Infrastructure cloud security / Mohammad GhasemiGol -- Confidentiality of data in the cloud : conflicts between security and cost / Nathalie Baracaldo, Joseph Glider -- Access control in cloud IaaS / Yun Zhang, Ram Krishnan, Farhan Patwa, Ravi Sandhu -- Cloud security and privacy management / Patrick Kamongi -- Hacking and countermeasures in the cloud / Farzaneh Abazari, Hassan Takabi, Morteza Analoui -- Risk management and disaster recovery in the cloud / Saman Zonouz -- Cloud auditing and compliance / Paolina Centonze -- Security as a service (SaaS) in the cloud / Saman Taghavi Zargar, Hassan Takabi, Jay Iyer -- Cloud forensics : model, challenges and approaches / Lei Chen, Nhien-An Le-Khac, Sebastian Schlepphorst, Lanchuan Xu -- Cyberterrorism in the cloud : through a glass darkly / Barry Cartwright, George R.S. Weir, Richard Frank -- Digital forensic process and model in the cloud / Nhien-An Le-Khac, James Plunkett, Tahar Kechadi, Lei Chen -- Data acquisition in the cloud / Nhien-An Le-Khac, Michel Mollema, Robert Craig, Steven Ryder, Lei Chen -- Digital evidence management, presentation, and court preparation in the cloud : a forensics readiness approach / Lucia De Marco, Nhien-An Le-Khac, Tahar Kechadi -- Analysis of cloud digital evidence / Irfan Ahmed -- Forensic-as-a-service (FaaS) in the cloud state-of-the-art / Avinash Srinivasan. | |
588 | 0 | _aOnline resource; title from digital title page (viewed on June 10, 2019). | |
520 | _aIn a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aCloud computing _xSecurity measures. |
|
650 | 0 | _aDigital forensic science. | |
650 | 6 |
_aInfonuagique _xS�ecurit�e _xMesures. |
|
650 | 7 |
_aCOMPUTERS _xComputer Literacy. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xComputer Science. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xData Processing. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xHardware _xGeneral. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xInformation Technology. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xMachine Theory. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xReference. _2bisacsh |
|
650 | 7 |
_aDigital forensic science _2fast |
|
700 | 1 |
_aChen, Lei, _d1978 July 28- _eeditor. |
|
700 | 1 |
_aTakabi, Hassan, _d1982- _eeditor. |
|
700 | 1 |
_aLe-Khac, Nhien-An, _d1972- _eeditor. |
|
758 |
_ihas work: _aSecurity, privacy, and digital forensics in the cloud (Text) _1https://id.oclc.org/worldcat/entity/E39PCFv3X8jcbyffqWrMRvpGd3 _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _tSecurity, privacy and digital forensics in the cloud. _dHoboken, NJ ; Singapore : John Wiley & Sons, 2019 _z9781119053286 _w(DLC) 2018034906 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119053385 |
938 |
_aProQuest Ebook Central _bEBLB _nEBL5672658 |
||
938 |
_aEBSCOhost _bEBSC _n2018856 |
||
938 |
_aYBP Library Services _bYANK _n16027859 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH35965376 |
||
938 |
_aYBP Library Services _bYANK _n16080645 |
||
938 |
_aInternet Archive _bINAR _nisbn_9781119053286 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12571 _d12571 |