Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Confidential Computing

Best Price (Coupon Required):
Buy Confidential Computing for $76.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $84.99 - $84.99
BEST PRICE

Single Product Purchase

$76.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$84.99 $84.99

10% OFF
This deals requires coupon
$76.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9789811930454
Condition
New
Product Description

This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clearnot encrypted or otherwise protectedin order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a servers hard drive if it is stolen while exposed in memory. As computing moves to span multiple environmentsfrom on-premise to public cloud to edgeorganizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each others data.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Superradiance

Superradiance

$64.99
Multi-Drug Resistance in Cancer

Multi-Drug Resistance in Cancer

$84.99
Landscapes of Time-Frequency Analysis

Landscapes of Time-Frequency Analysis

$109.99
Experimentation and the Lyric in Contemporary French Poetry

Experimentation and the Lyric in Contemporary French Poetry

$99.99
Mechanics of Sound Generation in Flows

Mechanics of Sound Generation in Flows

$109.99
Wie whlen Neubrger?

Wie whlen Neubrger?

$59.99
Moments of Leadership

Moments of Leadership

$79.99
Number Theory in Memory of Eduard Wirsing

Number Theory in Memory of Eduard Wirsing

$139.99
Govering for the Environment

Govering for the Environment

$84.99
Metipranolol

Metipranolol

$44.99
Proceedings of International Conference on Recent Trends in Computing

Proceedings of International Conference on Recent Trends in Computing

$249.99
Grundlagen der Bruchmechanik

Grundlagen der Bruchmechanik

$79.99
European Critical Infrastructure Protection

European Critical Infrastructure Protection

$109.99
A New Unified Theory of Psychology

A New Unified Theory of Psychology

$139.99
Application of Fracture Mechanics to Materials and Structures

Application of Fracture Mechanics to Materials and Structures

$549.99
Forebrain Atlas of the Short-tailed Fruit Bat, Carollia perspicillata

Forebrain Atlas of the Short-tailed Fruit Bat, Carollia perspicillata

$109.99
Major Companies of The Far East and Australasia 1992/93

Major Companies of The Far East and Australasia 1992/93

$74.99
Nano-Engineered Cementitious Composites

Nano-Engineered Cementitious Composites

$109.99
Artificial Intelligence in Label-free Microscopy

Artificial Intelligence in Label-free Microscopy

$99.00
Information Management and Big Data

Information Management and Big Data

$54.99
Generalized Inverses: Theory and Computations

Generalized Inverses: Theory and Computations

$129.99
Proceedings of the Third World Conference on Floating Solutions

Proceedings of the Third World Conference on Floating Solutions

$279.99
Software Engineering Research, Management and Applications

Software Engineering Research, Management and Applications

$109.00
Protocols and Methodologies in Basic Science and Clinical Cardiac MRI

Protocols and Methodologies in Basic Science and Clinical Cardiac MRI

$84.99
Dynamics of Vibro-Impact Systems

Dynamics of Vibro-Impact Systems

$84.99
Das Frben und Bleichen der Textilfasern in Apparaten

Das Frben und Bleichen der Textilfasern in Apparaten

$44.99
Solar Power Plants

Solar Power Plants

$84.99
Controllability of Singularly Perturbed Linear Time Delay Systems

Controllability of Singularly Perturbed Linear Time Delay Systems

$129.99
Praktisches Krankenpflege-Examen

Praktisches Krankenpflege-Examen

$69.99
Non-Opioid Analgesics in the Treatment of Acute Pain

Non-Opioid Analgesics in the Treatment of Acute Pain

$54.99
Theory and Practice of Geometric Modeling

Theory and Practice of Geometric Modeling

$169.00
Adjoint Topology Optimization Theory for Nano-Optics

Adjoint Topology Optimization Theory for Nano-Optics

$169.99
Kompendium Orthopdische Bildgebung

Kompendium Orthopdische Bildgebung

$109.00
Credit Networks in The Preindustrial World

Credit Networks in The Preindustrial World

$59.99
Algebraic Aspects of Integrable Systems

Algebraic Aspects of Integrable Systems

$39.99
The Capacity to Share

The Capacity to Share

$109.99
Reviews of Physiology, Biochemistry and Pharmacology

Reviews of Physiology, Biochemistry and Pharmacology

$129.00
Vom Wesen der deutschen Universitt

Vom Wesen der deutschen Universitt

$84.99
Magnetic Resonance Scanning and Epilepsy

Magnetic Resonance Scanning and Epilepsy

$39.99
Ergebnisse der Exakten Naturwissenschaften

Ergebnisse der Exakten Naturwissenschaften

$59.99
previous
next