000 | 06957cam a2200781 i 4500 | ||
---|---|---|---|
001 | on1076372854 | ||
003 | OCoLC | ||
005 | 20220711203143.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181126t20192019nju ob 001 0 eng | ||
010 | _a 2018056741 | ||
040 |
_aDLC _beng _erda _epn _cDLC _dOCLCO _dOCLCF _dN$T _dEBLCP _dDG1 _dYDX _dOCLCQ _dOTZ _dUMI _dOCLCQ _dCOO _dOCLCQ _dTOH _dHS0 _dBRF _dMM9 _dUKAHL _dVT2 |
||
019 |
_a1119557716 _a1124361767 _a1156342207 _a1165222728 _a1166371232 _a1167513351 _a1167588711 _a1180647762 |
||
020 | _a1119053404 | ||
020 |
_a9781119053378 _q(electronic book) |
||
020 |
_a1119053374 _q(electronic book) |
||
020 |
_a9781119053408 _q(electronic book) |
||
020 |
_a9781119053385 _q(electronic book) |
||
020 |
_a1119053382 _q(electronic book) |
||
020 |
_z9781119053286 _q(hardcover) |
||
029 | 1 |
_aAU@ _b000065193805 |
|
029 | 1 |
_aCHNEW _b001039228 |
|
029 | 1 |
_aCHVBK _b559026919 |
|
035 |
_a(OCoLC)1076372854 _z(OCoLC)1119557716 _z(OCoLC)1124361767 _z(OCoLC)1156342207 _z(OCoLC)1165222728 _z(OCoLC)1166371232 _z(OCoLC)1167513351 _z(OCoLC)1167588711 _z(OCoLC)1180647762 |
||
037 |
_aCL0501000070 _bSafari Books Online |
||
042 | _apcc | ||
050 | 1 | 4 |
_aQA76.585 _b.S43 2019 |
072 | 7 |
_aCOM _x013000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x018000 _2bisacsh |
|
072 | 7 |
_aCOM _x067000 _2bisacsh |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x037000 _2bisacsh |
|
072 | 7 |
_aCOM _x052000 _2bisacsh |
|
082 | 0 | 0 |
_a004.67/82 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aSecurity, privacy and digital forensics in the cloud / _cedited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac. |
264 | 1 |
_aHoboken, NJ ; _aSingapore : _bJohn Wiley & Sons, Inc., _c2019. |
|
264 | 4 | _c©2019 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction to the cloud and fundamental security and privacy issues of the cloud / Hassan Takabi, Mohammad GhasemiGol -- Infrastructure cloud security / Mohammad GhasemiGol -- Confidentiality of data in the cloud : conflicts between security and cost / Nathalie Baracaldo, Joseph Glider -- Access control in cloud IaaS / Yun Zhang, Ram Krishnan, Farhan Patwa, Ravi Sandhu -- Cloud security and privacy management / Patrick Kamongi -- Hacking and countermeasures in the cloud / Farzaneh Abazari, Hassan Takabi, Morteza Analoui -- Risk management and disaster recovery in the cloud / Saman Zonouz -- Cloud auditing and compliance / Paolina Centonze -- Security as a service (SaaS) in the cloud / Saman Taghavi Zargar, Hassan Takabi, Jay Iyer -- Cloud forensics : model, challenges and approaches / Lei Chen, Nhien-An Le-Khac, Sebastian Schlepphorst, Lanchuan Xu -- Cyberterrorism in the cloud : through a glass darkly / Barry Cartwright, George R.S. Weir, Richard Frank -- Digital forensic process and model in the cloud / Nhien-An Le-Khac, James Plunkett, Tahar Kechadi, Lei Chen -- Data acquisition in the cloud / Nhien-An Le-Khac, Michel Mollema, Robert Craig, Steven Ryder, Lei Chen -- Digital evidence management, presentation, and court preparation in the cloud : a forensics readiness approach / Lucia De Marco, Nhien-An Le-Khac, Tahar Kechadi -- Analysis of cloud digital evidence / Irfan Ahmed -- Forensic-as-a-service (FaaS) in the cloud state-of-the-art / Avinash Srinivasan. | |
588 | 0 | _aOnline resource; title from digital title page (viewed on June 10, 2019). | |
520 | _aIn a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers. | ||
650 | 0 |
_aCloud computing _xSecurity measures. _94647 |
|
650 | 0 |
_aDigital forensic science. _94648 |
|
650 | 7 |
_aCOMPUTERS _xComputer Literacy. _2bisacsh _94649 |
|
650 | 7 |
_aCOMPUTERS _xComputer Science. _2bisacsh _94650 |
|
650 | 7 |
_aCOMPUTERS _xData Processing. _2bisacsh _94651 |
|
650 | 7 |
_aCOMPUTERS _xHardware _xGeneral. _2bisacsh _94652 |
|
650 | 7 |
_aCOMPUTERS _xInformation Technology. _2bisacsh _94653 |
|
650 | 7 |
_aCOMPUTERS _xMachine Theory. _2bisacsh _94654 |
|
650 | 7 |
_aCOMPUTERS _xReference. _2bisacsh _94655 |
|
650 | 7 |
_aDigital forensic science. _2fast _0(OCoLC)fst02000600 _94648 |
|
655 | 4 |
_aElectronic books. _93294 |
|
655 | 0 |
_aElectronic books. _93294 |
|
700 | 1 |
_aChen, Lei, _d1978 July 28- _eeditor. _94656 |
|
700 | 1 |
_aTakabi, Hassan, _d1982- _eeditor. _94657 |
|
700 | 1 |
_aLe-Khac, Nhien-An, _d1972- _eeditor. _94658 |
|
776 | 0 | 8 |
_iPrint version: _tSecurity, privacy and digital forensics in the cloud. _dHoboken, NJ ; Singapore : John Wiley & Sons, 2019 _z9781119053286 _w(DLC) 2018034906 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119053385 _zWiley Online Library |
942 | _cEBK | ||
994 |
_aC0 _bDG1 |
||
999 |
_c68314 _d68314 |