Secure Data Deletion
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Reardon, Joel (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
Edición: | 1st ed. 2016. |
Colección: | Information Security and Cryptography,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits /
por: Peeters, Eric
Publicado: (2013) -
Towards Hardware-Intrinsic Security Foundations and Practice /
Publicado: (2010) -
Introduction to Public Key Infrastructures
por: Buchmann, Johannes A., et al.
Publicado: (2013) -
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
por: Haataja, Keijo, et al.
Publicado: (2013) -
Secure IT Systems 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings /
Publicado: (2012)