Edité par Information Science Reference, 2014
ISBN 10 : 1466665599 ISBN 13 : 9781466665590
Langue: anglais
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 318,21
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
EUR 331,76
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
EUR 344,93
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Edité par Information Science Reference, 2014
ISBN 10 : 1466665599 ISBN 13 : 9781466665590
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 354,55
Quantité disponible : Plus de 20 disponibles
Ajouter au panierGebunden. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. This title explores the latest innovation.
Edité par Information Science Reference, 2014
ISBN 10 : 1466665599 ISBN 13 : 9781466665590
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 441,16
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.