Muutke küpsiste eelistusi

E-raamat: Enterprise Security: Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015. The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access and big data ownership, studies and analysis to reduce risks imposed by data leakage, hacking and challenges of Cloud forensics.
Challenges of Cloud Forensics
1(18)
Humid Jahankhani
Amin Hosseinian-Far
Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
19(21)
Bob Duncan
Mark Whittington
Martin Gilje Jaatun
Alfredo Ramiro Reyes Zuniga
The Relationship Between Public Budgeting and Risk Management: Competition or Driving?
40(33)
Yaotai Lu
Iris Biometrics Recognition in Security Management
73(24)
Ahmad Ghaffari
Amin Hosseinian-Far
Akbar Sheikh-Akbari
Automatic Clustering of Malicious IP Flow Records Using Unsupervised Learning
97(23)
Muhammad Fahad Umer
Muhammad Sher
A Hybrid Model of Attribute Aggregation in Federated Identity Management
120(35)
Md. Sadek Ferdous
Farida Chowdhury
Ron Poet
Robust Enterprise Application Security with eTRON Architecture
155(24)
M. Fahim Ferdous Khan
Ken Sakamura
Noboru Koshizuka
Obfuscation and Diversification for Securing Cloud Computing
179(24)
Shohreh Hosseinzadeh
Samuel Lauren
Sampsa Rauti
Sami Hyrynsalmi
Mauro Conti
Ville Leppanen
An Approach to Organizational Cybersecurity
203(20)
Jose Romero-Mariona
Roger Hallman
Megan Kline
Geancarlo Palavicini
Josiah Bryan
John San Miguel
Lawrence Kerr
Maxine Major
Jorge Alvarez
Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage
223(18)
Fara Yahya
Robert J. Walters
Gary B. Wills
Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud
241(18)
Madini O. Alassafi
Raid K. Hussain
Ghada Ghashgari
R.J. Walters
G.B. Wills
Protecting Document Outside Enterprise Network: A Confirmed Framework
259(18)
Zeyad S. Aaber
Gary B. Wills
Richard M. Crowder
Author Index 277