Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Title Handbook of Research on Securing Cloud-Based Databases with Biometric Applications PDF eBook
Author Deka, Ganesh Chandra
Publisher IGI Global
Pages 556
Release 2014-10-31
Genre Computers
ISBN 1466665602

Download Handbook of Research on Securing Cloud-Based Databases with Biometric Applications Book in PDF, Epub and Kindle

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing
Title Handbook of Research on Security Considerations in Cloud Computing PDF eBook
Author Munir, Kashif
Publisher IGI Global
Pages 409
Release 2015-07-28
Genre Computers
ISBN 1466683880

Download Handbook of Research on Security Considerations in Cloud Computing Book in PDF, Epub and Kindle

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Handbook of Research on Multimedia Cyber Security

Handbook of Research on Multimedia Cyber Security
Title Handbook of Research on Multimedia Cyber Security PDF eBook
Author Gupta, Brij B.
Publisher IGI Global
Pages 372
Release 2020-04-03
Genre Computers
ISBN 179982702X

Download Handbook of Research on Multimedia Cyber Security Book in PDF, Epub and Kindle

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
Title Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities PDF eBook
Author Ng, Alex Chi Keung
Publisher IGI Global
Pages 259
Release 2018-01-26
Genre Computers
ISBN 1522548297

Download Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities Book in PDF, Epub and Kindle

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Title Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security PDF eBook
Author Gupta, Brij
Publisher IGI Global
Pages 616
Release 2016-05-16
Genre Computers
ISBN 1522501061

Download Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Book in PDF, Epub and Kindle

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Handbook of Research on Threat Detection and Countermeasures in Network Security

Handbook of Research on Threat Detection and Countermeasures in Network Security
Title Handbook of Research on Threat Detection and Countermeasures in Network Security PDF eBook
Author Al-Hamami, Alaa Hussein
Publisher IGI Global
Pages 450
Release 2014-10-31
Genre Computers
ISBN 146666584X

Download Handbook of Research on Threat Detection and Countermeasures in Network Security Book in PDF, Epub and Kindle

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing
Title Security Management in Mobile Cloud Computing PDF eBook
Author Munir, Kashif
Publisher IGI Global
Pages 266
Release 2016-08-01
Genre Computers
ISBN 1522506039

Download Security Management in Mobile Cloud Computing Book in PDF, Epub and Kindle

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.