語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Confidential Computing = Hardware Based Memory Protection /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Confidential Computing/ edited by Vicente Garcia Diaz, Gloria Jeanette Rincón Aponte.
其他題名:
Hardware Based Memory Protection /
其他作者:
Rincón Aponte, Gloria Jeanette.
面頁冊數:
IX, 215 p. 159 illus., 119 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-981-19-3045-4
ISBN:
9789811930454
Confidential Computing = Hardware Based Memory Protection /
Confidential Computing
Hardware Based Memory Protection /[electronic resource] :edited by Vicente Garcia Diaz, Gloria Jeanette Rincón Aponte. - 1st ed. 2022. - IX, 215 p. 159 illus., 119 illus. in color.online resource. - Advanced Technologies and Societal Change,2191-6861. - Advanced Technologies and Societal Change,.
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server’s hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments—from on-premise to public cloud to edge—organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other’s data.
ISBN: 9789811930454
Standard No.: 10.1007/978-981-19-3045-4doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Confidential Computing = Hardware Based Memory Protection /
LDR
:04342nam a22004095i 4500
001
1083467
003
DE-He213
005
20220923103708.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811930454
$9
978-981-19-3045-4
024
7
$a
10.1007/978-981-19-3045-4
$2
doi
035
$a
978-981-19-3045-4
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Confidential Computing
$h
[electronic resource] :
$b
Hardware Based Memory Protection /
$c
edited by Vicente Garcia Diaz, Gloria Jeanette Rincón Aponte.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
IX, 215 p. 159 illus., 119 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Technologies and Societal Change,
$x
2191-6861
505
0
$a
1. Design And Implementation Of Mobile Jammer For High Security System -- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm -- 3. Disasteranalysison Government Data -- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware -- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics -- 6. Monitoring Suspicious Discussion On Online Forum -- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique -- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service -- 9. Development Of Raspberry Pibot Surveillance Security System -- 10. Image Security Based On Rotational Visual Cryptography -- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment -- 12. Deep Transfer Learning For Detecting Cyber Attacks -- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm -- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection -- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot -- 16. A Novel Architecture For Detecting And Preventing Network Intrusions -- 17. Cyber Hacking Breaches For Demonstrating And Forecasting -- 18. Enhancedsecurity With Crystographyusing Aes And Lsb -- 19. A Smart Security Systems Using National Instruments Myrio -- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques -- 21. Detection Of Cyber Threats In application platforms.
520
$a
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server’s hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments—from on-premise to public cloud to edge—organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other’s data.
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Quantum Computing.
$3
883739
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Data protection.
$3
557764
650
0
$a
Sustainability.
$3
793436
650
0
$a
Quantum computers.
$3
564139
650
0
$a
Cloud Computing.
$3
995022
650
0
$a
Computational intelligence.
$3
568984
700
1
$a
Rincón Aponte, Gloria Jeanette.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1389459
700
1
$a
Garcia Diaz, Vicente.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1320724
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811930447
776
0 8
$i
Printed edition:
$z
9789811930461
776
0 8
$i
Printed edition:
$z
9789811930478
830
0
$a
Advanced Technologies and Societal Change,
$x
2191-6853
$3
1255195
856
4 0
$u
https://doi.org/10.1007/978-981-19-3045-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入