Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- cloud storage 2 Treffer
- access control 1 Treffer
- attribute-based encryption 1 Treffer
- authentication 1 Treffer
- authorization 1 Treffer
-
29 weitere Werte:
- centralization 1 Treffer
- cloud attacks 1 Treffer
- cloud computing 1 Treffer
- cloud environment 1 Treffer
- cloud security model 1 Treffer
- data encryption 1 Treffer
- ddos attack 1 Treffer
- deployment model 1 Treffer
- encrypted key exchange 1 Treffer
- hybrid cloud 1 Treffer
- iaas 1 Treffer
- identity management 1 Treffer
- key distribution 1 Treffer
- key management 1 Treffer
- mobile device security 1 Treffer
- paas 1 Treffer
- phishing 1 Treffer
- private cloud 1 Treffer
- ransomware 1 Treffer
- saas 1 Treffer
- secret sharing 1 Treffer
- security architecture 1 Treffer
- security mechanism 1 Treffer
- security requirements 1 Treffer
- security testing 1 Treffer
- side-channel attack 1 Treffer
- sql injection 1 Treffer
- threat intelligence 1 Treffer
- tokenization 1 Treffer
4 Treffer
-
In: Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices; (2016) S. 19-35Online E-BookZugriff:
-
In: Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices; (2016) S. 1-18Online E-BookZugriff:
-
In: Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices; (2016) S. 37-68Online E-BookZugriff:
-
In: Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices; (2016) S. 69-100Online E-BookZugriff: