logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Developing and Securing the Cloud

Developing and Securing the Cloud (Hardcover)

Bhavani Thuraisingham (지은이)
Auerbach Publications
302,250원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
247,840원 -18% 0원
12,400원
235,440원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Developing and Securing the Cloud
eBook 미리보기

책 정보

· 제목 : Developing and Securing the Cloud (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 일반
· ISBN : 9781439862919
· 쪽수 : 730쪽
· 출판일 : 2013-10-28

목차

IntroductionAbout This BookSupporting Technologies From Mainframe to the Cloud Security Technologies Data, Information, and Knowledge ManagementSecure Services Technologies Secure Services Technologies Secure Semantic Services Specialized Secure ServicesCloud Computing ConceptsExperimental Cloud Computing SystemsSecure Cloud ComputingExperimental Secure Cloud Computing SystemsExperimental Cloud Computing for Security ApplicationsToward Trustworthy CloudsBuilding an Infrastructure, Education Program, and a Research Program for a Secure CloudOrganization of This BookNext StepsSUPPORTING TECHNOLOGIESFrom Mainframe to the CloudOverviewEarly Computing SystemsDistributed ComputingWorld Wide WebCloud ComputingSummary and DirectionsReferencesTrustworthy SystemsOverviewSecure Systems Overview Access Control and Other Security Concepts Types of Secure Systems Secure Operating Systems Secure Database Systems Secure Networks Emerging Trends Impact of the Web Steps to Building Secure SystemsDependable SystemsOverview Trust Management Digital Rights Management Privacy Integrity, Data Quality, and High AssuranceSecurity Threats and SolutionsBuilding Secure Systems from Untrusted ComponentsSummary and DirectionsReferencesData, Information and Knowledge ManagementOverviewData ManagementData Management Complex Data ManagementInformation Management Data Warehousing and Data Mining Information Retrieval Search EnginesKnowledge ManagementActivity Management E-Business and E-Commerce Collaboration and Workflow Information Integration Information Sharing Social Networking Supply Chain ManagementSummary and DirectionsReferencesConclusion to Part ISECURE SERVICES TECHNOLOGIESService-Oriented Computing and SecurityOverviewService-Oriented Computing Services Paradigm SOA and Web Services Service-Oriented Analysis and DesignSecure Service-Oriented Computing Secure Services Paradigm Secure SOA and WS Secure SOAD Access Control for WS Digital Identity Management Security Models for WSSummary and DirectionsReferencesSemantic Web Services and SecurityOverviewSemantic WebLayered Technology Stack eXtensible Markup Language Resource Description Framework Ontologies Web Rules and SWRL Semantic Web ServicesSecure Semantic Web Services Security for the Semantic Web XML Security RDF Security Security and Ontologies Secure Query and Rules Processing Privacy and Trust for the Semantic Web Secure Semantic Web and WSSummary and DirectionsReferencesSpecialized Web Services and SecurityOverviewSpecialized Web Services Overview Web Services for Data Management Web Services for Complex Data Management Web Services for Information Management Web Services for Knowledge Management Web Services for Activity Management Domain Web Services Emerging Web ServicesSecure Specialized Web Services Overview Web Services for Secure Data Management Web Services for Secure Complex Data Management Web Services for Secure Information Management Web Services for Secure Knowledge Management Secure Web Services for Activity Management Secure Domain Web Services Emerging Secure Web ServicesSummary and DirectionsReferencesConclusion to Part IICLOUD COMPUTING CONCEPTSCloud Computing ConceptsOverviewPreliminaries in Cloud Computing Cloud Deployment Models Service ModelsVirtualizationCloud Storage and Data ManagementSummary and DirectionsReferencesCloud Computing FunctionsOverviewCloud Computing FrameworkCloud OSs and HypervisorsCloud NetworksCloud Data and Storage ManagementCloud ApplicationsCloud Policy Management, Back-Up, and RecoverySummary and DirectionsReferencesCloud Data ManagementOverviewRelational Data ModelArchitectural IssuesDBMS Functions Overview Query Processing Transaction Management Storage Management Metadata Management Database Integrity Fault ToleranceData MiningOther AspectsSummary and DirectionsReferencesSpecialized Clouds, Services, and ApplicationsOverviewSpecialized Clouds Mobile Clouds Multimedia CloudsCloud ApplicationsSummary and DirectionsReferencesCloud Service Providers, Products, and FrameworksOverviewCloud Service Providers, Products, and FrameworksCloud Service Providers Cloud Products Cloud FrameworksSummary and DirectionsReferencesConclusion to Part IIIEXPERIMENTAL CLOUD COMPUTING SYSTEMSExperimental Cloud Query Processing SystemOverviewOur ApproachRelated WorkArchitecture Data Generation and Storage File Organization Predicate SplitSplit Using Explicit-Type Information of Object Split Using Implicit-Type Information of ObjectMapReduce Framework Overview Input Files Selection Cost Estimation for Query Processing Query Plan Generation Breaking Ties by Summary Statistics MapReduce Join ExecutionResults Data Sets, Frameworks, and Experimental Setup EvaluationSummary and DirectionsReferencesSocial Networking on the CloudOverviewFoundational Technologies for SNODSOC and SNODSOC++ SNOD Location Extraction Entity/Concept Extraction and Integration Ontology Construction Cloud Query ProcessingDesign of SNODSOC Overview of the Modules SNODSOC and Trend Analysis Content-Driven Location Extraction Categorization Ontology ConstructionToward SNODSOC++ Benefits of SNOD++Cloud-Based Social Network Analysis Stream Processing Twitter Storm for SNODSOCRelated WorkSummary and DirectionsReferencesExperimental Semantic Web-Based Cloud Computing SystemsOverviewJena-HBase: A Distributed, Scalable, and Efficient RDF Triple StoreStormRider: Harnessing "Storm" for Social NetworksOntology-Driven Query Expansion Using Map/Reduce Framework BET Calculation Using MapReduce Distributed ComputingSummary and DirectionsReferencesConclusion to Part IVSECURE CLOUD COMPUTING CONCEPTSSecure Cloud Computing ConceptsOverviewSecure Cloud Computing and GovernanceSecurity ArchitectureIdentity Management and Access Control Cloud Identity AdministrationCloud Storage and Data SecurityPrivacy, Compliance, and Forensics for the Cloud Privacy Regulations and Compliance Cloud ForensicsCryptogaphic SolutionsNetwork SecurityBusiness Continuity PlanningOperations ManagementPhysical SecuritySummary and DirectionsReferencesSecure Cloud Computing FunctionsOverviewSecure Cloud Computing FrameworkSecure Cloud OSs and HypervisorsSecure Cloud NetworksSecure Cloud Storage ManagementSecure Cloud Data ManagementCloud Security and Integrity ManagementSecure Cloud ApplicationsSummary and DirectionsReferencesSecure Cloud Data ManagementOverviewSecure Data Management Access Control Inference Problem Secure Distributed/Heterogeneous Data Management Secure Object Data Systems Data Warehousing, Data Mining, Security, and Privacy Secure Information Management Secure Knowledge ManagementImpact of the Cloud Discretionary Security Inference Problem Secure Distributed and Heterogeneous Data Management Secure Object Systems Data Warehousing, Data Mining, Security, and Privacy Secure Information Management Secure Knowledge ManagementSummary and DirectionsReferencesSecure Cloud Computing GuidelinesOverviewThe GuidelinesSummary and DirectionsReferencesSecurity as a ServiceOverviewData Mining Services for Cyber Security Applications Overview Cyber Terrorism, Insider Threats, and External Attacks Malicious Intrusions Credit Card Fraud and Identity Theft Attacks on Critical Infrastructures Data Mining Services for Cyber SecurityCurrent Research on Security as a ServiceOther Services for Cyber Security ApplicationsSummary and DirectionsReferencesSecure Cloud Computing ProductsOverviewOverview of the ProductsSummary and DirectionsReferencesConclusion to Part VEXPERIMENTAL SECURE CLOUD COMPUTING SYSTEMSSecure Cloud Query Processing with Relational DataOverviewRelated WorkSystem Architecture The Web Application Layer The ZQL Parser Layer The XACML Policy LayerImplementation Details and ResultsImplementation Setup Experimental Datasets Implementation ResultsSummary and DirectionsReferencesSecure Cloud Query Processing with Semantic Web DataOverviewBackgroundRelated WorkAccess Control Model AT Assignment ConflictsSystem Architecture Overview of the ArchitecturePolicy Enforcement Query Rewriting Embedded Enforcement Postprocessing EnforcementExperimental Setup and ResultsSummary and DirectionsReferencesSecure Cloud-Based Information IntegrationOverviewIntegrating Blackbook with Amazon S3ExperimentsSummary and DirectionsReferencesConclusion to Part VIEXPERIMENTAL CLOUD SYSTEMS FOR SECURITY APPLICATIONSCloud-Based Malware Detection for Evolving Data StreamsOverviewMalware Detection Malware Detection as a Data Stream Classification Problem Cloud Computing for Malware Detection Our ContributionsRelated WorkDesign and Implementation of the System Ensemble Construction and Updating Error Reduction Analysis Empirical Error Reduction and Time Complexity Hadoop/MapReduce FrameworkMalicious Code Detection Ovverview Nondistributed Feature Extraction and Selection Distributed Feature Extraction and SelectionExperiments Data Sets Baseline MethodsDiscussionSummary and DirectionsReferencesCloud-Based Data Mining for Insider Threat DetectionOverviewChallenges, Related Work, and Our ApproachData Mining for Insider Threat Detection Our Solution Architecture Feature Extraction and Compact Representation RDF Repository Architecture Data Storage Answering Queries Using Hadoop MapReduce Data Mining ApplicationsComprehensive FrameworkSummary and DirectionsReferencesCloud-Centric Assured Information SharingOverviewSystem Design Design of CAISS Design of CAISS++ Formal Policy Analysis Implementation ApproachRelated Work Our Related Research Overall Related Research Commercial DevelopmentsSummary and DirectionsReferencesDesign and Implementation of a Semantic Cloud-Based Assured Information Sharing SystemOverviewArchitecture Overview Framework Configuration Modules in our Architecture Features of our Policy Engine FrameworkSummary and DirectionsReferencesConclusion to Part VIITOWARD A TRUSTWORTHY CLOUDTrust Management and the CloudOverviewTrust Management Trust Management and Negotiation Trust and Risk Management Reputation-Based SystemsTrust and Cloud Services Trust Management as a Cloud Service Trust Management for Cloud ServicesSummary and DirectionsReferencesPrivacy and Cloud ServicesOverviewPrivacy Management Privacy Issues Privacy Problem through Inference Platform for Privacy Preferences Privacy Preserving Cloud MiningPrivacy Management and the Cloud Cloud Services for Privacy Management Privacy for Cloud Services and Semantic Cloud ServicesSummary and DirectionsReferencesIntegrity Management, Data Provenance, and Cloud ServicesOverviewIntegrity, Data Quality, and Provenance Aspects of Integrity Inferencing, Data Quality, and Data ProvenanceIntegrity Management and Cloud Services Cloud Services for Integrity Management Integrity for the Cloud and Semantic Cloud ServicesSummary and DirectionsReferencesConclusion to Part VIIIBUILDING AN INFRASTRUCTURE, AN EDUCATION INITIATIVE, AND A RESEARCH PROGRAM FOR A SECURE CLOUD An Infrastructure for a Secure CloudOverviewDescription of the Research Infrastructure Background Infrastructure Development Hardware Component of the Infrastructure Software Component of the Infrastructure Data Component of the InfrastructureIntegrating the Cloud with Existing InfrastructuresSample Projects Utilizing the Cloud InfrastructureEducation and Performance Education Enhancement PerformanceSummary and DirectionsReferencesAn Education Program for a Secure CloudOverviewIA Education at UTDOverview of UTD CS Course Offerings in IA Our Educational Programs in IA Equipment and Facilities for IA Education and ResearchAssured Cloud Computing Education Program Organization of the Capacity-Building Activities Curriculum Development Activities Course Programming Projects Instructional Cloud Computing FacilityEvaluation PlanSummary and DirectionsReferencesA Research Initiative for a Secure CloudOverviewResearch Contributions Overview Secure Cloud Data and Information Management Cloud-Based Security Applications Security Models for the Cloud Toward Building Secure Social Networks in the CloudSummary and DirectionsReferences Summary and DirectionsAbout This ChapterSummary of This BookDirections for Cloud Computing and Secure Cloud Computing. Secure Services Cloud Computing Secure Cloud ComputingOur Goals on Securing the CloudWhere Do We Go from Here?Conclusion to Part IXAppendices: Data Management Systems?Developments and TrendsData Mining TechniquesAccess Control in Database SystemsAssured Information Sharing Life CycleIndex

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책