Cloud Security Auditing
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers...
Main Authors: | Majumdar, Suryadipta. (Author, http://id.loc.gov/vocabulary/relators/aut), Madi, Taous. (http://id.loc.gov/vocabulary/relators/aut), Wang, Yushun. (http://id.loc.gov/vocabulary/relators/aut), Tabiban, Azadeh. (http://id.loc.gov/vocabulary/relators/aut), Oqaily, Momen. (http://id.loc.gov/vocabulary/relators/aut), Alimohammadifar, Amir. (http://id.loc.gov/vocabulary/relators/aut), Jarraya, Yosr. (http://id.loc.gov/vocabulary/relators/aut), Pourzandi, Makan. (http://id.loc.gov/vocabulary/relators/aut), Wang, Lingyu. (http://id.loc.gov/vocabulary/relators/aut), Debbabi, Mourad. (http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
Edition: | 1st ed. 2019. |
Series: | Advances in Information Security,
76 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-030-23128-6 |
Similar Items
-
Cognitive Radio Networks Dynamic Resource Allocation Schemes / by Shaowei Wang.
by: Wang, Shaowei., et al.
Published: (2014) -
Advanced Free Space Optics (FSO) A Systems Approach / by Arun K. Majumdar.
by: Majumdar, Arun K., et al.
Published: (2015) -
Distributed Medium Access Control in Wireless Networks by Ping Wang, Weihua Zhuang.
by: Wang, Ping., et al.
Published: (2013) -
Location Privacy Preservation in Cognitive Radio Networks by Wei Wang, Qian Zhang.
by: Wang, Wei., et al.
Published: (2014) -
Device-to-Device Communications in Cellular Networks by Li Wang, Huan Tang.
by: Wang, Li., et al.
Published: (2016)