Privacy and Security for Cloud Computing (Computer Communications and Networks)
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...
Concepts of Database Management
CONCEPTS OF DATABASE MANAGEMENT fits perfectly into any introductory database course for information systems, business or CIS programs. This concise text teaches SQL in a database-neutral environment with all major topics being covered, including E-R diagrams, normalization, and database design. Now in its seventh edition, CONCEPTS OF DATABASE... Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...
Access Control Systems: Security, Identity Management and Trust Models Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as... Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science)
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the...
|Result Page: 28 27 26 25 24 23 22 21 20 19 |