You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This reference presents a vital compendium of research detailing the latest case studies, architectures, frameworks, methodologies, and research on Grid and Cloud Computing"--
Enhances libraries worldwide through top research compilations from over 250 international authors in the field of e-business.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data on the cloud is imperative. Cloud Security: Concepts, Methodologies, Tools, and Applications explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud, this multi-volume book is ideally designed for IT specialists, web designers, computer engineers, software developers, academicians, researchers, and graduate-level students interested in cloud computing concepts and security.
Nigeria Fourth Republic National Assembly: Politics, Policies, Challenges and Media Perspectives provides profound but incisive insights into the first eight years (1999-2007) of the Fourth Republic National Assembly. The book critically appraises the eras of all the Senate Presidents and four Speakers, focusing essentially on their leadership dexterousness and the challenges, intrigues, brinkmanship, debilitating drama, power play and nights of long knives and consensus-building approach that characterized the two Chambers during the period under focus. Reflecting extensively on practical examples, images and cases, it underlines in the most graphic and digestible fashion the many blisterin...
Nigeria is the most dynamic country on the African continent. Yet the legacy of colonialism, deep-rooted corruption, exposure to climate change and the proliferation of small arms have created a precarious security situation that holds back the country's potential for peace and prosperity. Security in Nigeria explores the many security threats facing Nigeria and assesses the government's responses to date. With contributors spanning three continents, it provides an original and comprehensive analysis of 'old' and 'new' security threats and offers original solutions to address the crisis.
One of the critical concerns in Nigeria is how to alleviate poverty in the country. The general prevalence of poverty in Nigeria is paradoxical because the country is one of the biggest oil-producing countries in the world. A 1999 World Bank report for instance showed that some 70 per cent of the population lives below the bread line - usually considered as living on less than US$1.00 a day. This raises a number of very important questions: What are really responsible for the wide prevalence of poverty in Nigeria in the midst of plenty? How is poverty manifested in the country? What alleviation strategies are in place? How effective are they? And what are the implications of all these for th...
None