security in computing online kopen

Ben je op zoek naar security in computing? Bekijk onze boeken selectie en zie direct bij welke webshop je security in computing online kan kopen. Ga je voor een ebook of paperback van security in computing. Zoek ook naar accesoires voor security in computing. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je security in computing met korting of in de aanbieding. Alles voor veel leesplezier!

Cloud Computing Security

Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing;

Vergelijkbare producten zoals Cloud Computing Security

Security of Cloud-Based Systems

This edition covers different topics from security of cloud-based systems, including: threats detection in cloud environments, frameworks;

Vergelijkbare producten zoals Security of Cloud-Based Systems

Cloud Computing Security

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical;

Vergelijkbare producten zoals Cloud Computing Security

Security and Privacy for Big Data, Cloud Computing and Applications

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and;

Vergelijkbare producten zoals Security and Privacy for Big Data, Cloud Computing and Applications

Security and Privacy Trends in Cloud Computing and Big Data

This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and;

Vergelijkbare producten zoals Security and Privacy Trends in Cloud Computing and Big Data

Security with Intelligent Computing and Big data Services

In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these;

Vergelijkbare producten zoals Security with Intelligent Computing and Big data Services

Cyber Security in Parallel and Distributed Computing

of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e;

Vergelijkbare producten zoals Cyber Security in Parallel and Distributed Computing

Cloud Computing and Security

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August;

Vergelijkbare producten zoals Cloud Computing and Security

Auditing Cloud Computing

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or;

Vergelijkbare producten zoals Auditing Cloud Computing

Cloud Computing and Security

Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully;

Vergelijkbare producten zoals Cloud Computing and Security

Cloud Computing and Security

Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were;

Vergelijkbare producten zoals Cloud Computing and Security

Cloud Computing with Security

networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc;

Vergelijkbare producten zoals Cloud Computing with Security

Cloud Computing with Security

networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc;

Vergelijkbare producten zoals Cloud Computing with Security

Proceedings of International Conference on Smart Computing and Cyber Security

This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic;

Vergelijkbare producten zoals Proceedings of International Conference on Smart Computing and Cyber Security

Security and Data Storage Aspect in Cloud Computing

This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and;

Vergelijkbare producten zoals Security and Data Storage Aspect in Cloud Computing

Proceeding of First Doctoral Symposium on Natural Computing Research

engineering. The book focuses on computer vision and applications, soft computing, security for Internet of Things, security in heterogeneous networks;

Vergelijkbare producten zoals Proceeding of First Doctoral Symposium on Natural Computing Research

Case Studies in Secure Computing

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements;

Vergelijkbare producten zoals Case Studies in Secure Computing

Case Studies in Secure Computing

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements;

Vergelijkbare producten zoals Case Studies in Secure Computing

Security and Privacy in New Computing Environments

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments;

Vergelijkbare producten zoals Security and Privacy in New Computing Environments

Cloud Computing & Government

information security risks. Cloud computing can both increase and decrease the security of information systems in federal agencies. Potential;

Vergelijkbare producten zoals Cloud Computing & Government

Security in Computing and Communications

This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019;

Vergelijkbare producten zoals Security in Computing and Communications

Cloud Computing and Security

International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers;

Vergelijkbare producten zoals Cloud Computing and Security

Cloud Computing and Security

Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers;

Vergelijkbare producten zoals Cloud Computing and Security

Security Issues and Privacy Threats in Smart Ubiquitous Computing

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects;

Vergelijkbare producten zoals Security Issues and Privacy Threats in Smart Ubiquitous Computing

Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its;

Vergelijkbare producten zoals Cloud Computing and Virtualization

Guide to Security Assurance for Cloud Computing

-eminent authorities in cloud security assurance from both academia and industry. Topics and features: * Describes the important;

Vergelijkbare producten zoals Guide to Security Assurance for Cloud Computing

Advances on Smart and Soft Computing

processing, natural language processing, predictive analytics, knowledge management approaches, information security, security in IoT, big data and;

Vergelijkbare producten zoals Advances on Smart and Soft Computing

Einde inhoud

Geen pagina's meer om te laden'