This book would help the digital security people ongoing through the contents in this scenario. Mainly the book includes the definition of the most effective threats/attacks, such as APTs, particularly its anatomy, of the steps involved in APTs. Nowadays, most of the data that would store, process, analyze, and communicate through cloud-only. The book describes data security in the cloud storage system in this respect, by following CIA Triad. Additionally, the book describes APT's defense mechanism in networks and clouds. In addition, the book describes verifiable encryption and decryption by following the OFE (Optimistic Fair Exchange) prover and verifier mechanism. It narrated an intrusion detection system model for the design of low false-rate alarms using Machine Learning Techniques. Observation and analysis have been given in the book; this would be helpful for teachers, scholars, and faculty who are involved in this area of study.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 19,49 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: moluna, Greven, Alemania
Condición: New. Nº de ref. del artículo: 385946569
Cantidad disponible: Más de 20 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book would help the digital security people ongoing through the contents in this scenario. Mainly the book includes the definition of the most effective threats/attacks, such as APTs, particularly its anatomy, of the steps involved in APTs. Nowadays, most of the data that would store, process, analyze, and communicate through cloud-only. The book describes data security in the cloud storage system in this respect, by following CIA Triad. Additionally, the book describes APT's defense mechanism in networks and clouds. In addition, the book describes verifiable encryption and decryption by following the OFE (Optimistic Fair Exchange) prover and verifier mechanism. It narrated an intrusion detection system model for the design of low false-rate alarms using Machine Learning Techniques. Observation and analysis have been given in the book; this would be helpful for teachers, scholars, and faculty who are involved in this area of study. 108 pp. Englisch. Nº de ref. del artículo: 9786202528962
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book would help the digital security people ongoing through the contents in this scenario. Mainly the book includes the definition of the most effective threats/attacks, such as APTs, particularly its anatomy, of the steps involved in APTs. Nowadays, most of the data that would store, process, analyze, and communicate through cloud-only. The book describes data security in the cloud storage system in this respect, by following CIA Triad. Additionally, the book describes APT's defense mechanism in networks and clouds. In addition, the book describes verifiable encryption and decryption by following the OFE (Optimistic Fair Exchange) prover and verifier mechanism. It narrated an intrusion detection system model for the design of low false-rate alarms using Machine Learning Techniques. Observation and analysis have been given in the book; this would be helpful for teachers, scholars, and faculty who are involved in this area of study. Nº de ref. del artículo: 9786202528962
Cantidad disponible: 1 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -This book would help the digital security people ongoing through the contents in this scenario. Mainly the book includes the definition of the most effective threats/attacks, such as APTs, particularly its anatomy, of the steps involved in APTs. Nowadays, most of the data that would store, process, analyze, and communicate through cloud-only. The book describes data security in the cloud storage system in this respect, by following CIA Triad. Additionally, the book describes APT's defense mechanism in networks and clouds. In addition, the book describes verifiable encryption and decryption by following the OFE (Optimistic Fair Exchange) prover and verifier mechanism. It narrated an intrusion detection system model for the design of low false-rate alarms using Machine Learning Techniques. Observation and analysis have been given in the book; this would be helpful for teachers, scholars, and faculty who are involved in this area of study.Books on Demand GmbH, Überseering 33, 22297 Hamburg 108 pp. Englisch. Nº de ref. del artículo: 9786202528962
Cantidad disponible: 2 disponibles