Reference Hub1
Indices1
Information Security in Diverse Computing Environments

Information Security in Diverse Computing Environments

Copyright: © 2014 |Pages: 354
ISBN13: 9781466661585|ISBN10: 1466661585|EISBN13: 9781466661592
DOI: 10.4018/978-1-4666-6158-5
Cite Book Cite Book

MLA

Kayem, Anne, and Christoph Meinel, editors. Information Security in Diverse Computing Environments. IGI Global, 2014. https://doi.org/10.4018/978-1-4666-6158-5

APA

Kayem, A. & Meinel, C. (Eds.). (2014). Information Security in Diverse Computing Environments. IGI Global. https://doi.org/10.4018/978-1-4666-6158-5

Chicago

Kayem, Anne, and Christoph Meinel, eds. Information Security in Diverse Computing Environments. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-6158-5

Export Reference

Mendeley
Favorite Full-Book Download

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues.

Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Privacy, Anonymity, and Trust Management
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Cyber-Defense Challenges
This content has been removed at the discretion of the publisher and the editors.
Forensics, Malware Detection, and Analysis
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Cloud Security  (pages 260-260)
Cloud Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Concluding Thoughts on Information Security in Diverse Computing Environments
This content has been removed at the discretion of the publisher and the editors.
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.