Reference Hub8
Indices3
Security Engineering for Cloud Computing: Approaches and Tools

Security Engineering for Cloud Computing: Approaches and Tools

Copyright: © 2013 |Pages: 257
ISBN13: 9781466621251|ISBN10: 1466621257|EISBN13: 9781466621268
DOI: 10.4018/978-1-4666-2125-1
Cite Book Cite Book

MLA

Rosado, David G., et al., editors. Security Engineering for Cloud Computing: Approaches and Tools. IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2125-1

APA

Rosado, D. G., Mellado, D., Fernandez-Medina, E., & Piattini, M. G. (Eds.). (2013). Security Engineering for Cloud Computing: Approaches and Tools. IGI Global. https://doi.org/10.4018/978-1-4666-2125-1

Chicago

Rosado, David G., et al., eds. Security Engineering for Cloud Computing: Approaches and Tools. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2125-1

Export Reference

Mendeley
Favorite Full-Book Download

Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing.

Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Cloud Architecture and Patterns
This content has been removed at the discretion of the publisher and the editors.
Risks and Vulnerabilities in Cloud Computing
This content has been removed at the discretion of the publisher and the editors.
Hardware Security and Secure Storage and Policy Management in Cloud
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.