Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
Introduces a reference architecture that enhances the security of services offered in the information and communication technology (ICT) market. This title enables customers to compare offerings and to assess risks when using third-party ICT services including cloud computing and mobile services.
Saved in:
| Main Author: | Von Faber, Eberhard |
|---|---|
| Corporate Author: | Ohio Library and Information Network |
| Other Authors: | Behnsen, Wolfgang |
| Format: | Book |
| Language: | English |
| Published: |
Wiesbaden
Springer Vieweg
c2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Security for cloud computing
by: Lombardi, Flavio, et al.
Published: (2015)
by: Lombardi, Flavio, et al.
Published: (2015)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Information protection playbook
Published: (2013)
Published: (2013)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017)
by: Hagar, Jon Duncan
Published: (2017)
Modern principles, practices, and algorithms for cloud security
Published: (2019)
Published: (2019)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Cryptography for security and privacy in cloud computing
by: Rass, Stefan, et al.
Published: (2014)
by: Rass, Stefan, et al.
Published: (2014)
Maritime security protection of marinas, ports, small watercraft, yachts, and ships
by: Benny, Daniel J.
Published: (2016)
by: Benny, Daniel J.
Published: (2016)
Logistics and transportation security a strategic, tactical, and operational guide to resilience
by: Burns, Maria G.
Published: (2015)
by: Burns, Maria G.
Published: (2015)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Maritime security an introduction
by: McNicholas, Michael
Published: (2016)
by: McNicholas, Michael
Published: (2016)
Fourth-generation corporate security asymmetrical warfare for protective services professionals
by: Godlewski, R.J
Published: (2014)
by: Godlewski, R.J
Published: (2014)
Securing Web services practical usage of standards and specifications
Published: (2008)
Published: (2008)
Big book of IPsec RFCs Internet security architecture
by: Loshin
Published: (2000)
by: Loshin
Published: (2000)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Industrial cybersecurity efficiently secure critical infrastructure systems
by: Ackerman, Pascal
Published: (2017)
by: Ackerman, Pascal
Published: (2017)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Managing maritime safety
Published: (2018)
Published: (2018)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Similar Items
-
Security management in mobile cloud computing
Published: (2017) -
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015) -
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014) -
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009) -
Security for cloud computing
by: Lombardi, Flavio, et al.
Published: (2015)


