BOOKS - NETWORK TECHNOLOGIES - Data Security in Cloud Computing, Volume I
Data Security in Cloud Computing, Volume I - Giulio D
ECO~12 kg CO²

1 TON

Views
52939

Telegram
 
Data Security in Cloud Computing, Volume I
Author: Giulio D'Agostino
Year: 2019
Pages: 154
Format: PDF | EPUB
File size: 10.1 MB, 10.1 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Data Intensive Computing Applications for Big Data
Cloud Technologies An Overview of Cloud Computing Technologies for Managers
Data Engineering with dbt: A practical guide to building a cloud-based, pragmatic, and dependable data platform with SQL
Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume 1 (Advances in Intelligent Systems and Computing, 1325)
Ultimate Data Engineering with Databricks Develop Scalable Data Pipelines Using Data Engineering|s Core Tenets Such as Delta Tables, Ingestion, Transformation, Security, and Scalability
Ultimate Data Engineering with Databricks Develop Scalable Data Pipelines Using Data Engineering|s Core Tenets Such as Delta Tables, Ingestion, Transformation, Security, and Scalability
Data Analytics with Google Cloud Platform Build Real Time Data Analytics on Google Cloud Platform
Mastering Multi-Cloud Paradigm for Enterprises Transform Enterprise IT with Multi-Cloud Strategies Using Azure, AWS, and GCP for Optimizing Resources, Enhancing Security and Disaster Recovery
Mastering Multi-Cloud Paradigm for Enterprises Transform Enterprise IT with Multi-Cloud Strategies Using Azure, AWS, and GCP for Optimizing Resources, Enhancing Security and Disaster Recovery
Cloud Computing With C#
Cloud Computing With C#
Cloud Computing
The Cloud Computing Guidebook
Cloud Computing An Introduction
Encyclopedia of Cloud Computing
Cloud Computing World
Cloud Computing Networking
Cloud Computing Basics
Mastering Cloud Computing
Assured Cloud Computing
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Ultimate Splunk for Cybersecurity Practical Strategies for SIEM Using Splunk|s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Ultimate Parallel and Distributed Computing with Julia For Data Science Excel in Data Analysis, Statistical Modeling and Machine Learning by Leveraging MLBase.jl and MLJ.jl to Optimize Workflows
Ultimate Parallel and Distributed Computing with Julia For Data Science Excel in Data Analysis, Statistical Modeling and Machine Learning by Leveraging MLBase.jl and MLJ.jl to Optimize Workflows
The Hidden Potential of DNS In Security Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals
The Hidden Potential of DNS In Security Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals
Security Analytics A Data Centric Approach to Information Security
Oracle Cloud Infrastructure (OCI) Security Handbook A practical guide for OCI Security
OpenStack Cloud Computing Cookbook
Enterprise Cloud Computing for Non-Engineers
Cloud Computing with e-Science Applications
Cloud Computing in Remote Sensing
Cloud Computing Principles and Paradigms
Microsoft Private Cloud Computing
Cloud Computing and Electronic Discovery
Cloud Computing Concepts and Technologies
Cloud Computing Design Patterns
Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
Intelligent Security Systems How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security