Amazon cover image
Image from Amazon.com

Security designs for the cloud, IoT, and social networking / edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar.

Contributor(s): Material type: TextTextLanguage: English Edition: First editionDescription: 1 online resourceISBN:
  • 9781119593188
  • 9781119593201
Subject(s): DDC classification:
  • 004.67/82
Online resources:
Partial contents:
Encryption algorithm for data security in cloud computing / Anindita Desarkar, Ajanta Das -- Analysis of security issues in cloud environment / Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty -- Security and challenges in mobile cloud computing / Ankur Dumka, Minakshi Memoria, Alaknanda Ashok.
Summary: "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
E-Books E-Books Indian Institute of Technology Tirupati 004.67/82 (Browse shelf(Opens below)) Available EB00797

Encryption algorithm for data security in cloud computing / Anindita Desarkar, Ajanta Das -- Analysis of security issues in cloud environment / Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty -- Security and challenges in mobile cloud computing / Ankur Dumka, Minakshi Memoria, Alaknanda Ashok.

"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"--

There are no comments on this title.

to post a comment.