Security and Risk Analysis for Intelligent Cloud Computing : Methods, Applications, and Preventions - Ajay Kumar

eTEXT

Security and Risk Analysis for Intelligent Cloud Computing

Methods, Applications, and Preventions

By: Ajay Kumar

eText | 19 December 2023 | Edition Number 1

At a Glance

eText


$249.70

or 4 interest-free payments of $62.42 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This edited book is a compilation of scholarly articles on the latest developments in the field of AI, Blockchain, and ML/DL in cloud security. This book is designed for security and risk assessment professionals, and to help undergraduate, postgraduate students, research scholars, academicians, and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies. Readers will gain detailed information on cloud computing security that—until now—has been difficult to access.

This book:

• Covers topics such as AI, Blockchain, and ML/DL in cloud security.

• Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread threats.

• Explains the privacy aspects you need to consider in the cloud, including how they compare with aspects considered in traditional computing models.

• Examines security delivered as a service—a different facet of cloud security.

Read online on
Desktop
Tablet
Mobile

More in Computer Networking & Communications