Books on the topic 'Cloud computing security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cloud computing security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Vacca, John R., ed. Cloud Computing Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372112.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9.
Full textHuang, Zhiqiu, Xingming Sun, Junzhou Luo, and Jian Wang, eds. Cloud Computing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7.
Full textSun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68505-2.
Full textSun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7.
Full textSehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. Cloud Computing with Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-24612-9.
Full textAlani, Mohammed M. Elements of Cloud Computing Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41411-9.
Full textBaalamurugan, K. M., S. Rakesh Kumar, Abhishek Kumar, Vishal Kumar, and Sanjeevikumar Padmanaban, eds. Blockchain Security in Cloud Computing. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-70501-5.
Full textWan, Jiafu, Kai Lin, Delu Zeng, et al., eds. Cloud Computing, Security, Privacy in New Computing Environments. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69605-8.
Full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textRittinghouse, John W. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full textPearson, Siani, and George Yee, eds. Privacy and Security for Cloud Computing. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4189-1.
Full textF, Ransome James, ed. Cloud computing: Implementation, management, and security. CRC Press, 2010.
Find full text1952-, Vines Russell Dean, ed. Cloud security: A comprehensive guide to secure cloud computing. Wiley Pub., 2010.
Find full textSecuring the cloud: Cloud computer security techniques and tactics. Syngress/Elsevier, 2011.
Find full textWilliams, Aiden E., and Alexander L. Robinson. Public cloud computing: Security and privacy guidelines. Edited by National Institute of Standards and Technology (U.S.). Nova Science Publisher's, 2012.
Find full textZhu, Shao Ying, Richard Hill, and Marcello Trovati, eds. Guide to Security Assurance for Cloud Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25988-8.
Full textNational Institute of Standards and Technology (U.S.), ed. Public cloud computing: Security and privacy guidelines. Nova Science Publisher's, 2012.
Find full textEnabling the new era of cloud computing: Data security, transfer, and management. Information Science Reference, 2014.
Find full textDeshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. Security and Data Storage Aspect in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3.
Full textauthor, Slamanig Daniel, ed. Cryptography for security and privacy in cloud computing. Artech House, 2014.
Find full textMunir, Kashif. Handbook of research on security considerations in cloud computing. Information Science Reference, 2015.
Find full textZbakh, Mostapha, Mohammed Essaaidi, Pierre Manneback, and Chunming Rong, eds. Cloud Computing and Big Data: Technologies, Applications and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-97719-5.
Full textBub, Udo, and Klaus-Dieter Wolfenstetter, eds. Beherrschbarkeit von Cyber Security, Big Data und Cloud Computing. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-06413-6.
Full textHari, Kokula Krishna, ed. Security Issues and Challenges in Cloud Computing: ICIEMS 2014. Association of Scientists, Developers and Faculties, 2014.
Find full textRandee, Adams, ed. Reliability and availability of cloud computing. Wiley-IEEE Press, 2012.
Find full textLoske, André. IT Security Risk Management in the Context of Cloud Computing. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-11340-7.
Full textSecurity, trust, and regulatory aspects of cloud computing in business environments. Information Science Reference, 2014.
Find full textAyappan, Manikandan, ed. Proceedings of The International Conference on Cloud Computing and eGovernance 2013: ICCCEG 2013. Association of Scientists, Developers and Faculties, 2013.
Find full textThuraisingham, Bhavani M. Developing and securing the cloud. CRC Press/Taylor & Francis Group, 2014.
Find full textYun bei jing xia shu ju ku an quan xing yu shu ju ku wan zheng xing yan jiu. Zhongguo shui li shui dian chu ban she, 2014.
Find full textVMware vSphere and virtual infrastructure security: Securing the virtual environment. Prentice Hall, 2009.
Find full textDeka, Ganesh Chandra, and Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Information, Science, Reference, 2015.
Find full textThe next IT revolution?: Cloud computing opportunities and challenges : hearing before the Subcommittee on Technology and Innovation, Committee on Science, Space, and Technology, House of Representatives, One Hundred Twelfth Congress, first session, Wednesday, September 21, 2011. U.S. G.P.O., 2011.
Find full textDigital forensics for network, Internet, and cloud computing: A forensic evidence guide for moving targets and data. Syngress, 2010.
Find full textTrivedi, Kunjal, and Keith Pasley. Cloud Computing Security. Pearson Education, Limited, 2012.
Find full textVacca, John R. Cloud Computing Security. Edited by John R. Vacca. CRC Press, 2020. http://dx.doi.org/10.1201/9780429055126.
Full text