Warning: Trying to access array offset on false in E:\WWW\html\user.php on line 121
Garcia Diaz Confidential Computing 9789811930447
Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Confidential Computing, Garcia Diaz


Варианты приобретения
Цена: 12196.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2026-06-01
Ориентировочная дата поставки: Июль
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Garcia Diaz
Название:  Confidential Computing
ISBN: 9789811930447
Издательство: Springer
Классификация:




ISBN-10: 9811930449
Обложка/Формат: Hardback
Страницы: 215
Вес: 0.55 кг.
Дата издания: 07.10.2022
Серия: Advanced Technologies and Societal Change
Язык: English
Издание: 1st ed. 2022
Иллюстрации: 119 illustrations, color; 40 illustrations, black and white; ix, 215 p. 159 illus., 119 illus. in color.
Размер: 235 x 155
Читательская аудитория: Professional & vocational
Основная тема: Engineering
Подзаголовок: Hardware based memory protection
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server’s hard drive if it is stolen while exposed in memory. As computing moves to span multiple environments—from on-premise to public cloud to edge—organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other’s data.
Дополнительное описание: 1. Design And Implementation Of Mobile Jammer For High Security System.- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm.- 3. Disasteranalysison Government Data.- 4. Edf: An Enhancement Of Droid Fusion Framework For Mi



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия