Atjaunināt sīkdatņu piekrišanu

Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 December 3, 2015, Revised Selected Papers 1st ed. 2017 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 277 pages, height x width: 235x155 mm, weight: 4394 g, 64 Illustrations, black and white; X, 277 p. 64 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10131
  • Izdošanas datums: 19-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319543792
  • ISBN-13: 9783319543796
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 277 pages, height x width: 235x155 mm, weight: 4394 g, 64 Illustrations, black and white; X, 277 p. 64 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10131
  • Izdošanas datums: 19-Mar-2017
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319543792
  • ISBN-13: 9783319543796
Citas grāmatas par šo tēmu:
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015. The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.
Challenges of Cloud Forensics
1(18)
Humid Jahankhani
Amin Hosseinian-Far
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
19(21)
Bob Duncan
Mark Whittington
Martin Gilje Jaatun
Alfredo Ramiro Reyes Zuniga
The Relationship Between Public Budgeting and Risk Management: Competition or Driving?
40(33)
Yaotai Lu
Iris Biometrics Recognition in Security Management
73(24)
Ahmad Ghaffari
Amin Hosseinian-Far
Akbar Sheikh-Akbari
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning
97(23)
Muhammad Fahad Umer
Muhammad Sher
A Hybrid Model of Attribute Aggregation in Federated Identity Management
120(35)
Md. Sadek Ferdous
Farida Chowdhury
Ron Poet
Robust Enterprise Application Security with eTRON Architecture
155(24)
M. Fahim Ferdous Khan
Ken Sakamura
Noboru Koshizuka
Obfuscation and Diversification for Securing Cloud Computing
179(24)
Shohreh Hosseinzadeh
Samuel Lauren
Sampsa Rauti
Sami Hyrynsalmi
Mauro Conti
Ville Leppanen
An Approach to Organizational Cybersecurity
203(20)
Jose Romero-Mariona
Roger Hallman
Megan Kline
Geancarlo Palavicini
Josiah Bryan
John San Miguel
Lawrence Kerr
Maxine Major
Jorge Alvarez
Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage
223(18)
Fara Yahya
Robert J. Walters
Gary B. Wills
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud
241(18)
Madini O. Alassafi
Raid K. Hussain
Ghada Ghashgari
R.J. Walters
G.B. Wills
Protecting Document Outside Enterprise Network: A Confirmed Framework
259(18)
Zeyad S. Aaber
Gary B. Wills
Richard M. Crowder
Author Index 277