注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全云之安全、隱私與數(shù)字取證(英文版)

云之安全、隱私與數(shù)字取證(英文版)

云之安全、隱私與數(shù)字取證(英文版)

定 價(jià):¥129.00

作 者: 陳磊,[美] 哈?!にū?,[愛(ài)爾蘭] N.A勒哈克 編
出版社: 高等教育出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書(shū)可以去


ISBN: 9787040523379 出版時(shí)間: 2019-10-01 包裝: 精裝
開(kāi)本: 16開(kāi) 頁(yè)數(shù): 351 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  《云之安全、隱私與數(shù)字取證(英文版)》以獨(dú)特而系統(tǒng)的方式討論了云的安全和隱私問(wèn)題以及相關(guān)的云取證。云計(jì)算是一種新興的革命性技術(shù),它一直在改變?nèi)藗兊纳詈凸ぷ鞣绞?。但是,隨著云計(jì)算和相關(guān)服務(wù)的不斷發(fā)展,安全和隱私已成為一個(gè)關(guān)鍵問(wèn)題。該書(shū)由該領(lǐng)域?qū)<易珜?,集中討論了云的安全性和隱私性,以及云數(shù)據(jù)、應(yīng)用程序和服務(wù)的數(shù)字取證。該書(shū)前半部分可使讀者對(duì)云安全的背景有全面的了解,也將有助于他們理解該書(shū)后半部分的數(shù)字調(diào)查、指導(dǎo)和建議?!对浦踩㈦[私與數(shù)字取證(英文版)》第—部分包括云基礎(chǔ)架構(gòu)的安全性,數(shù)據(jù)的機(jī)密性,云laaS中的訪問(wèn)控制,云安全和隱私管理,黑客攻擊和對(duì)策,風(fēng)險(xiǎn)管理和災(zāi)難恢復(fù),審計(jì)和合規(guī)以及安全服務(wù)(SaaS);第二部分包括云取證的模型、挑戰(zhàn)和方法,云中的網(wǎng)絡(luò)恐怖主義,云中的數(shù)字取證過(guò)程和模型,數(shù)據(jù)采集,數(shù)字證據(jù)管理、演示和法庭準(zhǔn)備,數(shù)字證據(jù)分析和取證服務(wù)(FaaS)?!对浦踩㈦[私與數(shù)字取證(英文版)》可作為信息安全、信息技術(shù)、計(jì)算機(jī)科學(xué)和網(wǎng)絡(luò)取證領(lǐng)域高年級(jí)本科生和研究生的學(xué)習(xí)參考書(shū),也可供安全專業(yè)人員、數(shù)字取證從業(yè)者和云服務(wù)提供商參考使用。

作者簡(jiǎn)介

暫缺《云之安全、隱私與數(shù)字取證(英文版)》作者簡(jiǎn)介

圖書(shū)目錄

List of Contributorsxv
Part ⅠCloud Securityand Privacy
Introduction to the Cloud and Fundamental Security and Privacylssues of the Cloud
Hassan Takabi and Mohammod GhasemiGol
1.1 Introduction
1.2 Cloud Computing and Securitylssues
1.3 Identity Securityin the Cloud
1.4 Information Securityin the Cloud
1.4.1 Confidentiality
1.4.2 Integrity
1.4.3 Availability
1.4.4 Accountability
1.4.5 Nonrepudiation
1.4.6 Key Considerations in Information Security
1.4.7 Information Security Analysis in Some Clouds
1.5 Cloud Security Standards
1.6 Conclusion
References
2 Cloudlnfrastructure Security
Mohammad Ghasemi Go
2.1 Introduction
2.2 Infrastructure Securityin the Cloud
2.2.1 Infrastructure Security: The Network Level
2.2.1.1 Network-LeveI Mitigation
2.2.2 Infrastructure Security: The Host Level
2.2.2.1 SaaS and PaaS Host Security
2.2.2.2 IaaS Host Security
2.2.3 Infrastructure Security: The Application Level
2.2.4 Hypervisor Securityin the Cloud
2.3 Infrastructure Security Analysis in Some Clouds
2.3.1 Force URL
2.3.2 Amazon AWS
2.3.3 Google App Engine
2.3.4 Microsoft Azure
2.4 Protecting Cloud Infrastructure
2.4.1 Software Maintenance and Patching Vulnerabilities
2.4.2 The Technology Stack
2.4.3 Disaster Recovery
2.4.4 Monitoring and Defending Infrastructure
2.4.5 Incident Response Team
2.4.6 Malicious Insiders
2.5 Conclusion
References
3 Confidentiality of Data in the Cloud: Conflicts Between Security and Cost
Nathalie Boracaldo and Joseph Glider
3.1 Introduction.
3.2 Background
3.3 Confidentiality: Threats and Adversaries
3.4 Achieving Data Confidentiality in Cloud Storage Systems
3.4.1 Cryptographic Solutions
3.4.1.1 Stage Encryption
3.4.1.2 End-to-End Encryption
3.5 Reducing Cloud Storage System Costs through Data-Reduction
Techniques
3.6 Reconciling Data Reduction and Confidentiality
3.6.1 Existing Techniques
3.7 Trusted Decrypter
3.7.1 Overview
3.7.2 Secure Data-Reduction Operations
3.7.2.1 Preliminaries
3.7.2.2 Detailed Secure Data-Reduction Operations
3.7.2.3 Write Requests
3.7.2.4 Read Requests
3.7.2.5 Rekeying Requests
3.7.2.6 File Deletion
3.7.2.7 Offboarding Requests
3.7.2.8 Secure Data Deletion
3.7.3 Securing the CriticaI Module
3.7.4 Security Analysis
3.7.4.1 Data Confidentiality
3.7.4.2 Data Confidentiality in the Presence of Deduplication
3.7.4.3 Security Impact of Different Technologies
3.7.5 TD Overhead and Performance Implications
3.8 Future Directions for Cloud Storage Confidentiality with Low Cost
……
Part Ⅱ Cloud Forensics

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) www.stefanvlieger.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)