Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

  • 2h 37m
  • T. Gunasekhar
  • IGI Global
  • 2019
Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data.