Muutke küpsiste eelistusi

Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 December 3, 2015, Revised Selected Papers 1st ed. 2017 [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 277 pages, kõrgus x laius: 235x155 mm, kaal: 4394 g, 64 Illustrations, black and white; X, 277 p. 64 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 10131
  • Ilmumisaeg: 19-Mar-2017
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319543792
  • ISBN-13: 9783319543796
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 277 pages, kõrgus x laius: 235x155 mm, kaal: 4394 g, 64 Illustrations, black and white; X, 277 p. 64 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 10131
  • Ilmumisaeg: 19-Mar-2017
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319543792
  • ISBN-13: 9783319543796
Teised raamatud teemal:
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015. The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.
Challenges of Cloud Forensics
1(18)
Humid Jahankhani
Amin Hosseinian-Far
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
19(21)
Bob Duncan
Mark Whittington
Martin Gilje Jaatun
Alfredo Ramiro Reyes Zuniga
The Relationship Between Public Budgeting and Risk Management: Competition or Driving?
40(33)
Yaotai Lu
Iris Biometrics Recognition in Security Management
73(24)
Ahmad Ghaffari
Amin Hosseinian-Far
Akbar Sheikh-Akbari
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning
97(23)
Muhammad Fahad Umer
Muhammad Sher
A Hybrid Model of Attribute Aggregation in Federated Identity Management
120(35)
Md. Sadek Ferdous
Farida Chowdhury
Ron Poet
Robust Enterprise Application Security with eTRON Architecture
155(24)
M. Fahim Ferdous Khan
Ken Sakamura
Noboru Koshizuka
Obfuscation and Diversification for Securing Cloud Computing
179(24)
Shohreh Hosseinzadeh
Samuel Lauren
Sampsa Rauti
Sami Hyrynsalmi
Mauro Conti
Ville Leppanen
An Approach to Organizational Cybersecurity
203(20)
Jose Romero-Mariona
Roger Hallman
Megan Kline
Geancarlo Palavicini
Josiah Bryan
John San Miguel
Lawrence Kerr
Maxine Major
Jorge Alvarez
Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage
223(18)
Fara Yahya
Robert J. Walters
Gary B. Wills
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud
241(18)
Madini O. Alassafi
Raid K. Hussain
Ghada Ghashgari
R.J. Walters
G.B. Wills
Protecting Document Outside Enterprise Network: A Confirmed Framework
259(18)
Zeyad S. Aaber
Gary B. Wills
Richard M. Crowder
Author Index 277