Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Confidential Computing

Best Price (Coupon Required):
Buy Confidential Computing for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789811930454
Condition
New
Product Description

This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clearnot encrypted or otherwise protectedin order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a servers hard drive if it is stolen while exposed in memory. As computing moves to span multiple environmentsfrom on-premise to public cloud to edgeorganizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each others data.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

The Welfare State in Korea

The Welfare State in Korea

$84.99
Direktmarketing aus erster Hand

Direktmarketing aus erster Hand

$64.99
Disaster Risk Reduction in Mexico

Disaster Risk Reduction in Mexico

$54.99
Essays in Biography

Essays in Biography

$54.99
Different Forms of Microcredit and Social Business

Different Forms of Microcredit and Social Business

$149.00
Modern Nonparametric, Robust and Multivariate Methods

Modern Nonparametric, Robust and Multivariate Methods

$109.99
Sex Workers and Criminalization in North America and China

Sex Workers and Criminalization in North America and China

$49.99
The Weekly Faith Project- A Challenge to Journal, Reflect, and Cultivate a Genuine Faith by Zondervan

The Weekly Faith Project- A Challenge to Journal, Reflect, and Cultivate a Genuine Faith by Zondervan

$16.99
Internationaler Motorenkongress 2015

Internationaler Motorenkongress 2015

$359.00
Managing Change

Managing Change

$139.99
Rules and Reasoning

Rules and Reasoning

$54.99
In Situ Visualization for Computational Science

In Situ Visualization for Computational Science

$99.00
Genomic Designing for Biotic Stress Resistant Pulse Crops

Genomic Designing for Biotic Stress Resistant Pulse Crops

$169.00
Der Public Corporate Governance Kodex in ffentlichen Unternehmen

Der Public Corporate Governance Kodex in ffentlichen Unternehmen

$89.99
Conservation and Utilization of Threatened Medicinal Plants

Conservation and Utilization of Threatened Medicinal Plants

$149.00
Radiative Heat Transfer in Participating Media

Radiative Heat Transfer in Participating Media

$109.99
SCIAMACHY - Exploring the Changing Earths Atmosphere

SCIAMACHY - Exploring the Changing Earths Atmosphere

$84.99
Die Gegenwrtige Krise in der Schulreform

Die Gegenwrtige Krise in der Schulreform

$59.99
Novel Sustainable Alternative Approaches for the Textiles and Fashion Industry

Novel Sustainable Alternative Approaches for the Textiles and Fashion Industry

$129.00
Virtual Design of an Audio Lifelogging System

Virtual Design of an Audio Lifelogging System

$27.99
Grundlagen der Netzwerkforschung

Grundlagen der Netzwerkforschung

$49.99
Topics in Cryptology -- CT-RSA 2011

Topics in Cryptology -- CT-RSA 2011

$54.99
Leavitt Path Algebras

Leavitt Path Algebras

$64.99
Credit Relations

Credit Relations

$79.99
Function Spaces with Uniform, Fine and Graph Topologies

Function Spaces with Uniform, Fine and Graph Topologies

$54.99
Religion, Globalization and Political Culture in the Third World

Religion, Globalization and Political Culture in the Third World

$109.99
Enterohepatic Circulation of Bile Acids and Sterol Metabolism

Enterohepatic Circulation of Bile Acids and Sterol Metabolism

$219.99
The Physics of Submicron Semiconductor Devices

The Physics of Submicron Semiconductor Devices

$169.00
Information Ergonomics

Information Ergonomics

$84.99
The Economics of Banking and Finance in Africa

The Economics of Banking and Finance in Africa

$109.99
Menopause

Menopause

$50.40
Summer Birds

Summer Birds

$4.46
Ecology

Ecology

$54.99
Plant Breeding

Plant Breeding

$329.99
IT-Governance in der Praxis

IT-Governance in der Praxis

$59.99
Projektmanagement fr Ingenieure

Projektmanagement fr Ingenieure

$29.99
Intellectual Disability and Social Policies of Inclusion

Intellectual Disability and Social Policies of Inclusion

$79.99
Druckgasfeuerung Ein Verfahren zum Betrieb von Gasfeuersttten

Druckgasfeuerung Ein Verfahren zum Betrieb von Gasfeuersttten

$59.99
Multiple Sequence Alignment

Multiple Sequence Alignment

$129.99
Single-Facility Location Problems with Barriers

Single-Facility Location Problems with Barriers

$39.99
previous
next