Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4 from your keywords: subject="Cloud computing -- Se...
cover
Data security in cloud storage (wireless networks)
Comment Share
Zhang, YuanXu, ChunxiangShen, Xuemin Sherman

Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D

Edition
-
ISBN/ISSN
9789811543739
Collation
xii, 171 hlm.; ilus.; 24 cm
Series Title
-
Call Number
004.6782 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
CCSP Certified Cloud Security Professional official practice tests: an ISC2 c…
Comment Share
Malisow, Ben

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by d…

Edition
Second Edition
ISBN/ISSN
9781119603498
Collation
xxv, 373 hlm; 23 cm
Series Title
-
Call Number
004.6782 MAL c
Availability1
Add to basket
MARC DownloadCite
cover
Securing the cloud: cloud computer security techniques and tactics
Comment Share
Winkler, Vic J.R.

Contents CHAPTER 1 Introduction to Cloud Computing and Security 1 Understanding Cloud Computing 1 Cloud Scale, Patterns, and Operational Efficiency 2 A Synergistic Trick 3 Elasticity, Shape Shifting, and Security 3 The IT Foundation for Cloud 4 Cloud Computing as Foundation for Cloud Services 5 Cloud Computing Qualities 7 The Bottom Line 8 An Historical View: Roots of Cloud Comp…

Edition
--
ISBN/ISSN
9781597495929
Collation
xxiv, 290 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.6782 WIN s
Availability2
Add to basket
MARC DownloadCite
cover
Securing cloud and mobility: a practitioner's guide
Comment Share
Lim, IanHourani, PaulCoolidge, E. Coleen

Table of contents: pt. I Rethinking IT and Security ch. 1 Tectonic Shifts 1.1.Disruptive Forces 1.2.Deconstructing Cloud Computing 1.2.1.NIST Definition 1.2.2.The Three Service Models 1.2.3.The Four Deployment Models 1.3.The Rise of Mobility 1.4.New IT ch. 2 The Evolving Threat Landscape 2.1.From Cryptographers to World Leaders 2.2.The Changing Threat Landscape 2.3.Hacktivist…

Edition
--
ISBN/ISSN
9781439850558
Collation
xvii, 210 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LIM s
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?