Reference Hub1
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, B. Thirumala Rao
Copyright: © 2019 |Pages: 113
ISBN13: 9781522579243|ISBN10: 1522579249|EISBN13: 9781522579250
DOI: 10.4018/978-1-5225-7924-3
Cite Book Cite Book

MLA

Gunasekhar, T., et al., editors. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7924-3

APA

Gunasekhar, T., Rao, K., Kiran, P., Reddy, V., & Rao, B. (Eds.). (2019). Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. IGI Global. https://doi.org/10.4018/978-1-5225-7924-3

Chicago

Gunasekhar, T., et al., eds. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7924-3

Export Reference

Mendeley
Favorite Full-Book Download

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Introduction
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Conclusion
This content has been removed at the discretion of the publisher and the editors.
Related Readings
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.