Features of the management of data encryption keys in cloud storage

About The Book

Encryption provides protection during storage of stored data (inactive data). Attacks aimed at such data include attempts to gain physical access to the equipment on which data is stored with the subsequent compromise of this data. With such an attack during servicing the server's hard disk may be improperly managed allowing the attacker to extract it. An attacker can later place a hard drive in a computer under his control to try to gain access to the data.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE