Books on the topic 'Privacy in Cloud computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Privacy in Cloud computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Wan, Jiafu, Kai Lin, Delu Zeng, et al., eds. Cloud Computing, Security, Privacy in New Computing Environments. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69605-8.
Full textPearson, Siani, and George Yee, eds. Privacy and Security for Cloud Computing. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4189-1.
Full textKumar, T. Ananth, T. S. Arun Samuel, R. Dinesh Jackson Samuel, and M. Niranjanamurthy. Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880.
Full textLynn, Theo, John G. Mooney, Lisa van der Werff, and Grace Fox, eds. Data Privacy and Trust in Cloud Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54660-1.
Full textWilliams, Aiden E., and Alexander L. Robinson. Public cloud computing: Security and privacy guidelines. Edited by National Institute of Standards and Technology (U.S.). Nova Science Publisher's, 2012.
Find full textCheung, Anne S. Y., and Rolf H. Weber. Privacy and legal issues in cloud computing. Edward Elgar Publishing., 2015.
Find full textNational Institute of Standards and Technology (U.S.), ed. Public cloud computing: Security and privacy guidelines. Nova Science Publisher's, 2012.
Find full textauthor, Slamanig Daniel, ed. Cryptography for security and privacy in cloud computing. Artech House, 2014.
Find full textTariq, Muhammad Imran, Valentina Emilia Balas, and Shahzadi Tayyaba. Security and Privacy Trends in Cloud Computing and Big Data. CRC Press, 2022. http://dx.doi.org/10.1201/9781003107286.
Full textPeters, Emmanuel Sean. An Anonymous and Distributed Approach to Improving Privacy in Cloud Computing: An Analysis of Privacy-Preserving Tools & Applications. [publisher not identified], 2017.
Find full textKee, Tan Nam, ed. Private cloud computing: Consolidation, virtualization, and service-oriented infrastructure. Morgan Kaufmann, 2012.
Find full textInstitute, Pennsylvania Bar. Family law in the internet age. Pennsylvania Bar Institute, 2012.
Find full textChen, Zhi Xian. IBM Workload Deployer: Pattern-based application and middleware deployments in a private cloud. IBM, International Technical Support Organization, 2012.
Find full textUnited, States Congress House Committee on the Judiciary Subcommittee on Crime Terrorism Homeland Security and Investigations. ECPA: Lawful access to stored content : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, March 19, 2013. U.S. Government Printing Office, 2013.
Find full textLi, Fenghua, Hui Li, and Ben Niu. Privacy Computing. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-4943-4.
Full textLi, Jin, Yang Xiang, Kai Lin, et al. Cloud Computing, Security, Privacy in New Computing Environments. Springer, 2017.
Find full textPearson, Siani, and George Yee. Privacy and Security for Cloud Computing. Springer, 2014.
Find full textCheung, Anne, and Rolf Weber. Privacy and Legal Issues in Cloud Computing. Edward Elgar Publishing, 2015. http://dx.doi.org/10.4337/9781783477074.
Full textCheung, Anne S. Y., and Rolf H. Weber. Privacy and Legal Issues in Cloud Computing. Elgar Publishing Limited, Edward, 2015.
Find full textCheung, Anne S. Y., and Rolf H. Weber. Privacy and Legal Issues in Cloud Computing. Elgar Publishing Limited, Edward, 2016.
Find full textHonan, Brian, Raj Samani, and Jim Reavis. CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security. Elsevier Science & Technology Books, 2014.
Find full textCSA Guide to Cloud Computing: Implementing Cloud Privacy and Security. Elsevier Science & Technology Books, 2014.
Find full textLin, Xiaodong, Xuemin (Sherman) Shen, and Jianbing Ni. Privacy-Enhancing Fog Computing and Its Applications. Springer, 2018.
Find full textCendrowski, Harry, and James P. Martin. Cloud Computing and Electronic Discovery. Wiley & Sons, Limited, John, 2014.
Find full textCendrowski, Harry, and James P. Martin. Cloud Computing and Electronic Discovery. Wiley & Sons, Incorporated, John, 2014.
Find full textCendrowski, Harry, and James P. Martin. Cloud Computing and Electronic Discovery. Wiley & Sons, Incorporated, John, 2014.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Incorporated, John, 2011.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Incorporated, John, 2011.
Find full textGoel, Pawan Kumar, and Amit Singhal. Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Incorporated, John, 2011.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Incorporated, John, 2012.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Limited, John, 2011.
Find full textHalpert, Ben. Auditing Cloud Computing: A Security and Privacy Guide. Wiley & Sons, Incorporated, John, 2011.
Find full textLombardi, Flavio, and Robert Di Pietro. Security for Cloud Computing (Information Security and Privacy). Artech House, 2015.
Find full textMather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media, Incorporated, 2009.
Find full textMather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media, Incorporated, 2009.
Find full textMather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media, Incorporated, 2009.
Find full textCendrowski, Harry, and James P. Martin. Cloud Computing and Electronic Discovery. Wiley & Sons, Incorporated, John, 2014.
Find full textFlynn, Damian, Hans Vredevoort, Patrick Lownds, and Aidan Finn. Microsoft Private Cloud Computing. Wiley & Sons, Incorporated, John, 2012.
Find full textFlynn, Damian, Hans Vredevoort, Patrick Lownds, and Aidan Finn. Microsoft Private Cloud Computing. Wiley & Sons, Incorporated, John, 2012.
Find full textFlynn, Damian, Hans Vredevoort, Patrick Lownds, and Aidan Finn. Microsoft Private Cloud Computing. Wiley & Sons, Incorporated, John, 2012.
Find full textFlynn, Damian, Hans Vredevoort, Patrick Lownds, and Aidan Finn. Microsoft Private Cloud Computing. Wiley & Sons, Incorporated, John, 2012.
Find full textCiaramitaro, Barbara L. Security and Privacy in Organizational Cloud Computing: Balancing Risks and Benefits. IGI Global, 2013.
Find full textTake control of the cloud: Cut through the hype understand cloud services enhance privacy & security. TidBITS Pub., 2014.
Find full text