Vtome.ru - электронная библиотека

Security Designs for the Cloud, IoT, and Social Networking (2022)

  • Добавил: literator
  • Дата: 23-09-2023, 17:14
  • Комментариев: 0
Название: Security Designs for the Cloud, IoT, and Social Networking
Автор: Adele Kuzmiakova
Издательство: Arcler Press
Год: 2022
Страниц: 264
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and security challenges in cloud computing. It highlights the appplication safety and service vulnerability in cloud network. It also gives an introduction to IoT security and its open challenges, IoT architecture security and the introduction into the social network and its security issues, as well as the cyberspace security in the digital age.

Currently, the world is facing rapid technological advancement in every field. Unarguably, the most affected area is digital technology. The use of digital devices has increased to a much greater extent in the last decade. In this book three major aspects of digital technology data, social media, cloud computing, and internet of things (IoT) are discussed.

This book thoroughly examines the issues and vulnerabilities of IoT services. Due to the low cost of cloud services, almost every organization is storing their data in the cloud. This causes a big chunk of users’ personal data to be saved in the cloud, which can be a target for hackers who are always trying to get access to cloud storage.

Apart from that, IoT security and its open challenges have been thoroughly discussed in this book. We assume the readers have little previous knowledge of IoT and cloud computing. The first three chapters focus on the cloud and its security aspects.

The encryption standards, such as AES and RSA algorithms, are considered in Chapter 1 to understand the working of encryption algorithms for securing data over the cloud. In Chapter 2 the basic definition of cloud computing is discussed along with risk issues and security challenges in cloud computing.

The vulnerabilities and threats associated with cloud computing are also discussed. Chapter 3 discusses the roles and responsibilities of the cloud service providers in terms of the security of the user’s data. The major focus has been placed on the analytics and its importance for cloud security.

In Chapter 4 the IoT and its concepts are discussed along with the discussion of the threats and vulnerabilities of IoT.

In Chapter 5 the IoT aspects of security, such as network access control and software verification, have been evaluated. In Chapter 6 embedded systems have been discussed along their security aspects.

Chapter 7 explores different types of social networks. Finally, in Chapter 8 various cybersecurity aspects are examined.

Скачать Security Designs for the Cloud, IoT, and Social Networking












ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.