000 | 01942cam a2200385Mu 4500 | ||
---|---|---|---|
001 | on1390922594 | ||
003 | OCoLC | ||
005 | 20241121073201.0 | ||
006 | m d | ||
007 | cr cnu|||||||| | ||
008 | 231125s2023 xx o ||| 0 eng d | ||
040 |
_aEBLCP _beng _cEBLCP _dOCLCO _dOCLCQ _dEBLCP _dOCLCQ _dREDDC _dOCLCO _dN$T |
||
020 | _a9815136119 | ||
020 |
_a9789815136111 _q(electronic bk.) |
||
035 |
_a3635358 _b(N$T) |
||
035 | _a(OCoLC)1390922594 | ||
050 | 4 |
_aQA76.585 _b.B437 2023 |
|
082 | 0 | 4 |
_a004.6782 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBhardwaj, Akashdeep. _924834 |
|
245 | 1 | 0 |
_aNew Age Cyber Threat Mitigation for Cloud Computing Networks _h[electronic resource]. |
260 |
_aSharjah : _bBentham Science Publishers, _c2023. |
||
300 | _a1 online resource (184 p.) | ||
500 | _aDescription based upon print version of record. | ||
520 | _aIncreasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks. New Age. | ||
590 | _aAdded to collection customer.56279.3 | ||
650 | 0 |
_aCloud computing _xRisk assessment. _924835 |
|
650 | 0 | _aMobile computing. | |
650 | 6 |
_aInformatique mobile. _924836 |
|
776 | 0 | 8 |
_iPrint version: _aBhardwaj, Akashdeep _tNew Age Cyber Threat Mitigation for Cloud Computing Networks _dSharjah : Bentham Science Publishers,c2023 _z9789815136128 |
856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3635358 |
938 |
_aProQuest Ebook Central _bEBLB _nEBL30641713 |
||
938 |
_aEBSCOhost _bEBSC _n3635358 |
||
994 |
_a92 _bN$T |
||
999 |
_c9024 _d9024 |