Security, privacy and digital forensics in the cloud

In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Chen, Lei 1978 July 28- (HerausgeberIn), Takabi, Hassan 1982- (HerausgeberIn), Le-Khac, Nhien-An 1972- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hoboken, NJ Singapore John Wiley & Sons, Inc. 2019
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-04859962X
003 DE-627-1
005 20240228120614.0
007 cr uuu---uuuuu
008 191206s2019 xx |||||o 00| ||eng c
020 |a 1119053404  |9 1-119-05340-4 
020 |a 9781119053378  |c electronic book  |9 978-1-119-05337-8 
020 |a 1119053374  |c electronic book  |9 1-119-05337-4 
020 |a 9781119053408  |c electronic book  |9 978-1-119-05340-8 
020 |a 9781119053385  |c electronic book  |9 978-1-119-05338-5 
020 |a 1119053382  |c electronic book  |9 1-119-05338-2 
020 |a 9781119053286  |9 978-1-119-05328-6 
035 |a (DE-627-1)04859962X 
035 |a (DE-599)KEP04859962X 
035 |a (ORHE)9781119053286 
035 |a (DE-627-1)04859962X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
082 0 |a 004.67/82  |2 23 
245 1 0 |a Security, privacy and digital forensics in the cloud  |c edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac 
264 1 |a Hoboken, NJ  |a Singapore  |b John Wiley & Sons, Inc.  |c 2019 
264 4 |c ©2019 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019) 
520 |a In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers. 
650 0 |a Cloud computing  |x Security measures 
650 0 |a Digital forensic science 
650 4 |a Infonuagique ; Sécurité ; Mesures 
650 4 |a COMPUTERS ; Computer Literacy 
650 4 |a COMPUTERS ; Computer Science 
650 4 |a COMPUTERS ; Data Processing 
650 4 |a COMPUTERS ; Hardware ; General 
650 4 |a COMPUTERS ; Information Technology 
650 4 |a COMPUTERS ; Machine Theory 
650 4 |a COMPUTERS ; Reference 
650 4 |a Digital forensic science 
700 1 |a Chen, Lei  |d 1978 July 28-  |e HerausgeberIn  |4 edt 
700 1 |a Takabi, Hassan  |d 1982-  |e HerausgeberIn  |4 edt 
700 1 |a Le-Khac, Nhien-An  |d 1972-  |e HerausgeberIn  |4 edt 
776 1 |z 9781119053286 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781119053286 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781119053286/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-04859962X
_version_ 1818767279384428544
adam_text
any_adam_object
author2 Chen, Lei 1978 July 28-
Takabi, Hassan 1982-
Le-Khac, Nhien-An 1972-
author2_role edt
edt
edt
author2_variant l c lc
h t ht
n a l k nalk
author_facet Chen, Lei 1978 July 28-
Takabi, Hassan 1982-
Le-Khac, Nhien-An 1972-
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)04859962X
(DE-599)KEP04859962X
(ORHE)9781119053286
dewey-full 004.67/82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.67/82
dewey-search 004.67/82
dewey-sort 14.67 282
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04756cam a22006852 4500</leader><controlfield tag="001">ZDB-30-ORH-04859962X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120614.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053404</subfield><subfield code="9">1-119-05340-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053378</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05337-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053374</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-05337-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053408</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05340-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053385</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05338-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053382</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-05338-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053286</subfield><subfield code="9">978-1-119-05328-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04859962X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04859962X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119053286</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04859962X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy and digital forensics in the cloud</subfield><subfield code="c">edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="a">Singapore</subfield><subfield code="b">John Wiley &amp; Sons, Inc.</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Lei</subfield><subfield code="d">1978 July 28-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Takabi, Hassan</subfield><subfield code="d">1982-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Le-Khac, Nhien-An</subfield><subfield code="d">1972-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119053286</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119053286</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119053286/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-04859962X
illustrated Not Illustrated
indexdate 2024-12-18T08:47:21Z
institution BVB
isbn 1119053404
9781119053378
1119053374
9781119053408
9781119053385
1119053382
9781119053286
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher John Wiley & Sons, Inc.
record_format marc
spelling Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac
Hoboken, NJ Singapore John Wiley & Sons, Inc. 2019
©2019
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019)
In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers.
Cloud computing Security measures
Digital forensic science
Infonuagique ; Sécurité ; Mesures
COMPUTERS ; Computer Literacy
COMPUTERS ; Computer Science
COMPUTERS ; Data Processing
COMPUTERS ; Hardware ; General
COMPUTERS ; Information Technology
COMPUTERS ; Machine Theory
COMPUTERS ; Reference
Chen, Lei 1978 July 28- HerausgeberIn edt
Takabi, Hassan 1982- HerausgeberIn edt
Le-Khac, Nhien-An 1972- HerausgeberIn edt
9781119053286
Erscheint auch als Druck-Ausgabe 9781119053286
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781119053286/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Security, privacy and digital forensics in the cloud
Cloud computing Security measures
Digital forensic science
Infonuagique ; Sécurité ; Mesures
COMPUTERS ; Computer Literacy
COMPUTERS ; Computer Science
COMPUTERS ; Data Processing
COMPUTERS ; Hardware ; General
COMPUTERS ; Information Technology
COMPUTERS ; Machine Theory
COMPUTERS ; Reference
title Security, privacy and digital forensics in the cloud
title_auth Security, privacy and digital forensics in the cloud
title_exact_search Security, privacy and digital forensics in the cloud
title_full Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac
title_fullStr Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac
title_full_unstemmed Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac
title_short Security, privacy and digital forensics in the cloud
title_sort security privacy and digital forensics in the cloud
topic Cloud computing Security measures
Digital forensic science
Infonuagique ; Sécurité ; Mesures
COMPUTERS ; Computer Literacy
COMPUTERS ; Computer Science
COMPUTERS ; Data Processing
COMPUTERS ; Hardware ; General
COMPUTERS ; Information Technology
COMPUTERS ; Machine Theory
COMPUTERS ; Reference
topic_facet Cloud computing Security measures
Digital forensic science
Infonuagique ; Sécurité ; Mesures
COMPUTERS ; Computer Literacy
COMPUTERS ; Computer Science
COMPUTERS ; Data Processing
COMPUTERS ; Hardware ; General
COMPUTERS ; Information Technology
COMPUTERS ; Machine Theory
COMPUTERS ; Reference
url https://learning.oreilly.com/library/view/-/9781119053286/?ar
work_keys_str_mv AT chenlei securityprivacyanddigitalforensicsinthecloud
AT takabihassan securityprivacyanddigitalforensicsinthecloud
AT lekhacnhienan securityprivacyanddigitalforensicsinthecloud