Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Title | Handbook of Research on Securing Cloud-Based Databases with Biometric Applications PDF eBook |
Author | Deka, Ganesh Chandra |
Publisher | IGI Global |
Pages | 556 |
Release | 2014-10-31 |
Genre | Computers |
ISBN | 1466665602 |
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Handbook of Research on Security Considerations in Cloud Computing
Title | Handbook of Research on Security Considerations in Cloud Computing PDF eBook |
Author | Munir, Kashif |
Publisher | IGI Global |
Pages | 433 |
Release | 2015-07-28 |
Genre | Computers |
ISBN | 1466683880 |
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.
Handbook of Research on Multimedia Cyber Security
Title | Handbook of Research on Multimedia Cyber Security PDF eBook |
Author | Gupta, Brij B. |
Publisher | IGI Global |
Pages | 372 |
Release | 2020-04-03 |
Genre | Computers |
ISBN | 179982702X |
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.
Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
Title | Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities PDF eBook |
Author | Ng, Alex Chi Keung |
Publisher | IGI Global |
Pages | 259 |
Release | 2018-01-26 |
Genre | Computers |
ISBN | 1522548297 |
Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Title | Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security PDF eBook |
Author | Gupta, Brij |
Publisher | IGI Global |
Pages | 616 |
Release | 2016-05-16 |
Genre | Computers |
ISBN | 1522501061 |
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Handbook of Research on Threat Detection and Countermeasures in Network Security
Title | Handbook of Research on Threat Detection and Countermeasures in Network Security PDF eBook |
Author | Al-Hamami, Alaa Hussein |
Publisher | IGI Global |
Pages | 450 |
Release | 2014-10-31 |
Genre | Computers |
ISBN | 146666584X |
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.
Security Management in Mobile Cloud Computing
Title | Security Management in Mobile Cloud Computing PDF eBook |
Author | Munir, Kashif |
Publisher | IGI Global |
Pages | 266 |
Release | 2016-08-01 |
Genre | Computers |
ISBN | 1522506039 |
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.