Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
- 2h 37m
- T. Gunasekhar
- IGI Global
Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data.