menu
{ "item_title" : "Cryptographic Calculation for Securing Authentication", "item_author" : [" Srashtika Gupta "], "item_description" : "Cloud computing is a popular subject across the IT industry, but risks associated with this new technology and delivery model is not yet well understood. Because of the attractive features of cloud computing many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using clients as and when required. This technology provides services with one of the three service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). This model allows users and organizations to share their vital information, crucial computing resources across the world. Securing these essential resources from the unauthorized access of the users is one of the major issues which leads to reduce the growth of this technology in the Information Technology (IT) Industries. Authentication is one of the major security parameters while providing access of the registered services to the intended users.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/6/20/920/028/6209200281_b.jpg", "price_data" : { "retail_price" : "51.00", "online_price" : "51.00", "our_price" : "51.00", "club_price" : "51.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Cryptographic Calculation for Securing Authentication|Srashtika Gupta

Cryptographic Calculation for Securing Authentication

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Cloud computing is a popular subject across the IT industry, but risks associated with this new technology and delivery model is not yet well understood. Because of the attractive features of cloud computing many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using clients as and when required. This technology provides services with one of the three service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). This model allows users and organizations to share their vital information, crucial computing resources across the world. Securing these essential resources from the unauthorized access of the users is one of the major issues which leads to reduce the growth of this technology in the Information Technology (IT) Industries. Authentication is one of the major security parameters while providing access of the registered services to the intended users.

This item is Non-Returnable

Details

  • ISBN-13: 9786209200281
  • ISBN-10: 6209200281
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: December 2025
  • Dimensions: 9 x 6 x 0.13 inches
  • Shipping Weight: 0.19 pounds
  • Page Count: 56

Related Categories

You May Also Like...

    1

BAM Customer Reviews