Security, privacy and digital forensics in the cloud
In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ Singapore
John Wiley & Sons, Inc.
2019
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04859962X | ||
003 | DE-627-1 | ||
005 | 20240228120614.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
020 | |a 1119053404 |9 1-119-05340-4 | ||
020 | |a 9781119053378 |c electronic book |9 978-1-119-05337-8 | ||
020 | |a 1119053374 |c electronic book |9 1-119-05337-4 | ||
020 | |a 9781119053408 |c electronic book |9 978-1-119-05340-8 | ||
020 | |a 9781119053385 |c electronic book |9 978-1-119-05338-5 | ||
020 | |a 1119053382 |c electronic book |9 1-119-05338-2 | ||
020 | |a 9781119053286 |9 978-1-119-05328-6 | ||
035 | |a (DE-627-1)04859962X | ||
035 | |a (DE-599)KEP04859962X | ||
035 | |a (ORHE)9781119053286 | ||
035 | |a (DE-627-1)04859962X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.67/82 |2 23 | |
245 | 1 | 0 | |a Security, privacy and digital forensics in the cloud |c edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac |
264 | 1 | |a Hoboken, NJ |a Singapore |b John Wiley & Sons, Inc. |c 2019 | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019) | ||
520 | |a In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Digital forensic science | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Digital forensic science | |
700 | 1 | |a Chen, Lei |d 1978 July 28- |e HerausgeberIn |4 edt | |
700 | 1 | |a Takabi, Hassan |d 1982- |e HerausgeberIn |4 edt | |
700 | 1 | |a Le-Khac, Nhien-An |d 1972- |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781119053286 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119053286 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119053286/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04859962X |
---|---|
_version_ | 1818767279384428544 |
adam_text | |
any_adam_object | |
author2 | Chen, Lei 1978 July 28- Takabi, Hassan 1982- Le-Khac, Nhien-An 1972- |
author2_role | edt edt edt |
author2_variant | l c lc h t ht n a l k nalk |
author_facet | Chen, Lei 1978 July 28- Takabi, Hassan 1982- Le-Khac, Nhien-An 1972- |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04859962X (DE-599)KEP04859962X (ORHE)9781119053286 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04756cam a22006852 4500</leader><controlfield tag="001">ZDB-30-ORH-04859962X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120614.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053404</subfield><subfield code="9">1-119-05340-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053378</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05337-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053374</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-05337-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053408</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05340-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053385</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-05338-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119053382</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-05338-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119053286</subfield><subfield code="9">978-1-119-05328-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04859962X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04859962X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119053286</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04859962X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy and digital forensics in the cloud</subfield><subfield code="c">edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="a">Singapore</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Lei</subfield><subfield code="d">1978 July 28-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Takabi, Hassan</subfield><subfield code="d">1982-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Le-Khac, Nhien-An</subfield><subfield code="d">1972-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119053286</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119053286</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119053286/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04859962X |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:21Z |
institution | BVB |
isbn | 1119053404 9781119053378 1119053374 9781119053408 9781119053385 1119053382 9781119053286 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac Hoboken, NJ Singapore John Wiley & Sons, Inc. 2019 ©2019 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from digital title page (viewed on June 10, 2019) In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics - model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers. Cloud computing Security measures Digital forensic science Infonuagique ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Chen, Lei 1978 July 28- HerausgeberIn edt Takabi, Hassan 1982- HerausgeberIn edt Le-Khac, Nhien-An 1972- HerausgeberIn edt 9781119053286 Erscheint auch als Druck-Ausgabe 9781119053286 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781119053286/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Security, privacy and digital forensics in the cloud Cloud computing Security measures Digital forensic science Infonuagique ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
title | Security, privacy and digital forensics in the cloud |
title_auth | Security, privacy and digital forensics in the cloud |
title_exact_search | Security, privacy and digital forensics in the cloud |
title_full | Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac |
title_fullStr | Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac |
title_full_unstemmed | Security, privacy and digital forensics in the cloud edited by Lei Chen, Hassan Takabi, Nhien-An Le-Khac |
title_short | Security, privacy and digital forensics in the cloud |
title_sort | security privacy and digital forensics in the cloud |
topic | Cloud computing Security measures Digital forensic science Infonuagique ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
topic_facet | Cloud computing Security measures Digital forensic science Infonuagique ; Sécurité ; Mesures COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
url | https://learning.oreilly.com/library/view/-/9781119053286/?ar |
work_keys_str_mv | AT chenlei securityprivacyanddigitalforensicsinthecloud AT takabihassan securityprivacyanddigitalforensicsinthecloud AT lekhacnhienan securityprivacyanddigitalforensicsinthecloud |