menu
{ "item_title" : "Cloud Computing with Security", "item_author" : [" Naresh Kumar Sehgal", "Pramod Chandra P. Bhatt", "John M. Acken "], "item_description" : "This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the why's and how's of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/03/024/614/3030246140_b.jpg", "price_data" : { "retail_price" : "99.99", "online_price" : "99.99", "our_price" : "99.99", "club_price" : "99.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Cloud Computing with Security|Naresh Kumar Sehgal

Cloud Computing with Security : Concepts and Practices

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the "why's and how's" of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management. Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.


This item is Non-Returnable

Details

  • ISBN-13: 9783030246143
  • ISBN-10: 3030246140
  • Publisher: Springer
  • Publish Date: September 2020
  • Dimensions: 9.21 x 6.14 x 0.82 inches
  • Shipping Weight: 1.23 pounds
  • Page Count: 355

Related Categories

You May Also Like...

    1

BAM Customer Reviews