Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Data Security Environment in Cloud Computing.
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Dr. Vikas Somani,Dr. Sheshang Degadwala and Dr. Awanit Kumar
ISBN: 9786138838319
Год издания: 1905
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 120
Издательство: Scholars' Press
Цена: 40851 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 756077
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: In this book, I have design and implementation of data security environment on cloud computing for Healthcare sector. In general data security is a challenging issue in today’s environment when data travel from one terminal to another. In this book majorly two domains is used. One is the Cloud Computing. Cloud computing has developed as one of the newest terms for developing technology, and cloud computing has become one of the most significant problems facing main stream media. Numerous libraries on cloud computing have existed in recent years. Cloud computing's concept and practice is focused on cloud storage.Another one is Blockchain. A block chain is the technology which enables all participants to maintain a ledger that contains all operational data and renew their records in order to preserve consistency when a fresh customer occurs. Since the development of the Internet and authentication software has enabled all participants to check a transaction's accuracy. In block chain I focus on broker-free (P2P-based) features, which eliminating excessive charges through p2p operations without third party approval.
Ключевые слова: cloud, Blockchain, Security, electric sign algorithm