Friday, December 6, 2019

Emerging Technology and Innovation Maintenance of Security

Question: Describe about the Emerging Technology and Innovation for Maintenance of Security. Answer: Background There exist security issues in the process of maintenance of security as well as privacy in different access control techniques inCloud Service Provider Layer. The security issues can be considered the most important concern in the cloud computing. Particularly the privacy as well as integrity of data can be regarded as the primary security issues in the cloud service provider layer. There also exists uncertainty regarding the data storage that is done publically and there is uncertainty regarding the place where the data is stored that is the precise location of the particular data. Owing to this, that is the data handling in the cloud there exists high risk of the data being accessed unlawfully by attackers that is the attackers during the process of storage and transmission. Therefore, the process of enhancement of the mechanism of Cloud computing has essentially grabbed the limelight during the year 2013 when at a conference conducted in San Francisco, several vendors or the clou d service providers discussed about techniques to enhance the IT with strong mechanisms of controls in order to settle the cloud disorder. This particular trend of Cloud computing is escalating rapidly in order to make the technique of cloud computing more accepted for the organization and to help the businesses to recognize the correct area where related security threats actually lie. Problems The problems can be related to the threats that the existing technology of cloud computing faces in the networks as well as intranets. The critical issues can be referenced for the current project. This includes the right to admittance for moving the intricate application as well as the sensitive data publically and sharing the same in the cloud (Bansal, 2013).. The problems can also be related to the data confidentiality issues, integrity issues as well as the data availability issues that influence the privacy as well as the accessibility control techniques of the present cloud technologies. Significance of the study These developments in the process of ensuring the security and the privacy at the cloud service layers can help in decreasing the vulnerabilities that includes security issues that are on the rise (Baun, 2011). This paper therefore presents a detailed overview and learning of cloud computing, with a number of security threats as well as issues that are currently present in the cloud technologies as well as security resolution systems. Purpose and aims The purpose of the study is to Critically analyse the existing models of cloud computing Evaluation of the limitations of the existing models Determination of a new model that addresses the issues faced in the present cloud computing model Determining the process of implementation Evaluation of the process of implementation of the model Literature Review As rightly put forward by Carstensen et al., (2012), data security has time and again been a most important issue in area of information technology. Particularly, in the cloud computing situation, it has essentially become a matter of grave concern since the data is located in diverse spaces in the whole world. However, the security of data as well as protection of privacy can be considered to be the two most important factors that are of concern to the user as regards the technology of cloud technology. Meanwhile there are several procedures of cloud computing that has become important topics that have been examined in both academics as well as industries. Carvalho Johansson (2012) rightly points out that data security as well as privacy protection are increasingly becoming more significant for the potential development in the future in the area of implementation of cloud computing technology in Security as well as confidentiality in admittance Control procedures inCloud Service in government, business, and trade. As rightly indicated by Chhabra Muneesh Kumar (2011), data security as well as privacy fortification issues are pertinent to both hardware as well as software in the area of cloud architecture. However, prior academic reviews mentions about diverse security methods along with challenges from the perspective of both software as well as hardware facets for defending data in the cloud that intends to augment the data safety as well as privacy defence for the dependable cloud surroundings. Cloud computing strategy (2012) also put forward relative research examination of the existing research work concerning the data security, access control and privacy fortification techniques that can be utilized in the cloud computing area. However, at an extraordinary rapidity, cloud computing has altered the entire business as well as government operations. Moreover, this too generated advanced security challenges. The improvement of the cloud service framework offer business supporting expertise an d know-how in an added resourceful way. However, the transfer from server-to-service founded technology delivered a radical transformation in computing machinery (Ganesh Mehta, 2012). Nevertheless these advancements have formed several advanced security vulnerabilities that refers to security issues that are still on the rise. Therefore, this section presents a synopsis of the previous studies of cloud computing, with a number of security threats, safety issues, presently utilized cloud technologies in addition to safety solutions. Cloud Service Models As rightly indicated by Mahmood Hill (2011), the cloud Software-as-a-Service can be regarded as a allocation format that provides the authority as well as right to use software along with its functions distantly in the form of web-based service. However, software as a sort of service also allows corporations to enter into business operations at a very low down cost generally lesser than making payments for accredited applications in consideration of the fact that Service as software charge are essentially formed on a regular basis that might be based on monthly fee (Mahmood Hill, 2011). Therefore, the software is generally hosted distantly so the users do not have need of making payments for supplementary hardware. Markham Webb (2012) rightly mention that the software as a service also eradicates different probabilities for firms to handle diverse operations. This operation primarily includes the process of installation, establishments, regular preservation as well as protection. As rightly indicated by Marks Lozano (2010), the Platform as a service provides the potential as well as the stage to the users to install the cloud infrastructure. In the model of cloud platform as a service, the cloud suppliers get a definite computing stage that essentially comprises of the operating System (OS), Programming Language implementation situation, and database in addition to web servers. As correctly put forward by Marks Lozano (2010), the application developers can also build up as well as operate the software outcomes on cloud platform without incurring additional cost and without facing any difficulty of getting hold of and managing the major hardware as well as software corporations. For instance, in case of the cloud platform as a service of Oracle, the company provides the requisite database as a stage. Yet another instance is that of the windows azure. In this particular service, the Platform-as-a-Service provides the necessary provision to its users to arrange and install different user-designed or else acquired applications that can be used with the cloud infrastructure Mell Grance (2011). However, the model of platform as a service that is also known as the PaaS model can for the most part be considered as application enlargement atmosphere that can be projected as a Service through the supplier of the cloud service. In this case, the identified users can get access to the identified platforms that is generally possesses Integrated Development Environment (IDE) (Mell Grance, 2011). Accordingly the system comprises primarily of several operational functions carried out by the editor, expert assimilator as well as professionals for implementation or else the deployment of the different characteristic facets that can build up the entire applications. Moreover, the users can also install the advanced applications on the infrastructure delivered by the supplier of the cloud service. Monk Wagner (2012) mention that Cloud Infrastructure as a Service refers to an infrastructure of cloud computing where a service involves the deployment of specific hardware, networking modules as well as servers. The process also includes the installation of routers, new system of storage among many others that are essentially offered by the supplier of Infrastructure as a service. However, the users of this particular service accept and use the definite services offered by the suppliers only based on the business necessities. The businesses also make payments only for the particular infrastructure as a service that they utilize. The end user is capable of deploy and run any software, which comprise Operation Systems, applications. Security Issues As correctly put forward by Monk Wagner (2012), the technology of cloud computing also faces several security challenges as well as threats as regards the security as well as privacy in different access management methods as this are already there in the present system that is in the networks as well as the intranets. However, the challenges concerning the security as well as privacy concerns can appear in diverse forms (Monk Wagner, 2012). As per the reports of the research conducted by the Cloud computing alliance in the year 2013 the identified threats and security concerns regarding the privacy as well as control appear in different forms. This security threat might possibly take place in the form of Traffic Hijacking, Unprotected Interface as well as APIs (Olson Staley, 2012). Again, the threat might perhaps also appear in the form of refutation of Service, malevolent Insiders, and exploitation of Cloud Services. In addition to this, the breach of the access control can also t ake place owing to the inadequate Due Diligence, vulnerabilities for the process of using the shared technology, violation of the data, unidentified risk contour, violation of the Perimeter Security Model (Ray, 2011). Although cost along with easiness of use can be considered as the two most important advantageous factors of the cloud computing. Ray (2011) argues that there exists disturbing issues that particularly need to be outlined at the time of ma king allowances for operating significant application as well as sensitive data for the identified public as well as shared cloud situation. However, the primary aspect that adequately describes the accomplishment of any sort of advanced computing technology is essentially the degree or else the height of security that the system delivers. It is taken into consideration irrespective of the fact whether the data positioned in the cloud is properly fortified at that particular level so that the particular process can keep away from any kind of security breach. Therefore, Shroff (2010)mention that the Security as well as privacy concerns are the foremost challenges that might possibly be faced in the area of cloud computing. The challenges primarily i nclude the issues as regards the data confidentiality as well as data integrity. Data confidentiality issue: As rightly put forward by Stanoevska-Slabeva et al., (2010), the privacy can be considered as a set of regulations or else a contract that essentially limits the access or in other words system that implements several techniques for location restraint on definite categories of information. This is why the cloud data requires confidentiality of the information. For instance the data on the customers of a particular company as well as the task of calculation are particularly aspects that need confidentiality from both cloud provider as well as other customers who is currently utilizing the service (Stanoevska-Slabeva et al., 2010). This also calls for the necessity of the privacy as well as confidentiality of the information regarding the user and need not be accessed by any person in the system of cloud computing. This refers to the particular application, stages, CPU as well as physical memory (Sumner, 2014). Therefore it is quite apparent that confidentia lity regarding the data of the user can be disclosed to different service provider only on specific situations. The particular situations where data can be disclosed have also been disclosed in various prior studies. Some of the situations can be hereby discussed in the present context of the study. There might be particular situation in which the information regarding the user can be disclosed only at the time when the service provider is aware of the about the place private information regarding the user resides in the definite systems of cloud computing. Another important situation where information regarding user might perhaps be disclosed is the time when service provider has the full right to right to use and assembles private information regarding the user in the particular cloud systems of computing (Taborda, 2011). Yet another situation is when the information as regards the user might possibly be revealed at the time when the particular service provider can understand the significance of information regarding the user in the cloud computing systems. As rightly put forward by Vicat-Blanc (2011), there exists issue regarding Data integrity that refers to completeness as well as the wholeness of the particular data that forms the primary as well as the basic necessities of the system of information technology. The integrity of data is significant in the database uniformly as the integrity of data storage is vital as well as obligatory prerequisite in the cloud. Vicat-Blanc (2011) rightly put forward the fact that this particular factor has changed the entire performance of the cloud computing system. This is important as the data integrity substantiates the validity, steadiness as well as regularity of the data. Therefore, it is necessary to use an ideal method for writing the data in a protected way where the constant data storage can regain or else retrieve information by following the similar layout or form in which it was stored in the later period. Proposed Model As rightly indicated by Williams (2010), users cannot rely the cloud service suppliers as it is practically not possible for the cloud storage service providers to eradicate latent insider threat. It is also considered to be very dangerous for the end users to accumulate data directly as the perceptive data in system for cloud storage. The proposed model for ensuring greater privacy and better management of the access control techniques can integrate several key concepts as important facets. This includes advancement of the techniques of Homomorphic Encryption, Encrypted Search and Database, Distributive Storage, Hybrid Technique, Data Concealment, Deletion Confirmation (Williams, 2010). The present models that is the software as a service, platform as a service and the infrastructure as a service collectively known as the SPI model has certain limitations that the raise the concerns regarding the present techniques for controlling the unauthorised access and the privacy. The limitat ions of the SAS are primarily related to the security issues and the flaws in the web application, multi-tenancy as well as data security and the accessibility. The key limitations of the Paas can be associated to the challenges underlying the third parties, the basic infrastructure security use of shared resources and virtualization among many others (Hossain et al., 2012).. Therefore, the proposed models need to address the issues that are currently present in order to enhance the existing system in order to improve the privacy and the accessibility issues. Homomorphic Encryption: As rightly put forward by Hossain et al., (2012)., the process of Encryption is generally used to make it certain that the confidentiality of data is appropriately maintained. Gentry initially proposed the completely homomorphic encryption process that can perform any function that can be carried out without decrypting. Therefore, it can be considered to be a significant breakthrough in the technology of homomorphic encryption. Again, for more flexibility and enhanced security, a hybrid technique that can assimilate multiple encryption algorithms that includes the RSA, 3DES, in addition to random generation of number can be proposed for the new model. As rightly mentioned by Leon (2014), the RSA can be considered to be helpful for instituting a protected communication relationship through the way of digital signature founded on authentication whereas 3DES is predominantly of use for encryption of definite block data. In addition to this, a number of encryption algorithms for the purpose of ensuring the overall security of different user data in the system of cloud computing can be examined and thereby used in the proposed model (Leon, 2014). Encrypted Search and Database: As discussed by Mahmood Hill (2011), Encrypted search can be considered as the common practice that is already in use for the control techniques as well as fortification of the security. However, the entire process can be enhanced by using the In-Memory Database encryption procedure for the proposed model for the purpose of enhancement of privacy as well as security of different sensitive data in unprocessed cloud computing surroundings. Again, the asymmetric encryption technique can also be used for different databases in the system of cloud computing. However, in the proposed technique or else the proposed model, the system of commutative encryption can also be implemented on data for multiple times. In addition to this, the order of public or else the private key can also be utilized for encryption and also decryption. Again, the process of Reencryption method can also be used in the proposed system that reflects that the cipher-text data is appropr iately encrypted duly another time for the purpose of duality (Mahmood Hill, 2011). Therefore, such systems are very helpful as well as constructive in the system of cloud applications where confidentiality can be considered as the primary concern. A superior privacy-preserving multi-keyword graded search approach on the particular encrypted cloud data can also be planned that in turn can investigate the encrypted cloud data as well as sequentially place the data as well as the search results by eliminating the chances of leak of the privacy of the user. Distributive Storage: As rightly put forward by Carstensen et al., (2012), the process of distributive storage of data can also be considered a potential approach in the overall system of cloud environment. Carstensen et al., (2012), also points out that the security related issues connected to data privacy in the process of cloud computing technology refers to integrity of data, privacy intrusion, as well as accessibility of service in the process of cloud computing. In a bid to ensure the process of data integrity, one proposed alternative can be data storage in several clouds or else multiple cloud databases (Mahmood Hill, 2011). However, the data to be fortified from internal as well as external unlawful access can be divided into numerous chunks and the mechanism of Shamirs covert algorithm can be used to create a polynomial function aligned with each of the divided chunks (Mahmood Hill, 2011). Therefore different mechanisms for enhancing the present technique of security as a service can also be used for securing the data. However, the proposed method can attain maximum security by separating and isolating the data of the users into numerous pieces. The divided data chunks can thereafter be encrypted as well as stored in segmented databases that pursue the notion of distribution of data on the cloud. Since each of the sections of data can be encrypted and individually distributed in the cloud databases, this process can provide augmented security against diverse categories of security breaches and unauthorised access. Baun (2011) put forward the view that the distribution of different types of resources used for cloud computing is primarily founded on the customised dynamic enumeration. The modified or else the modified enumeration methods founded on the network design as well as the precise routes for different incoming as well as outgoing traffic that steadily can change the resources consistent with the needs of the user. Baun (2011) rightly mention that the tailored measurement primarily depends on the resources that can be used for computing and storage. Owing to the changeable characteristics of networks, the allotment of resources at a definite period of time founded on the customized active method cannot remain most advantageous. Therefore resources might perhaps increase or else decrease, accordingly the system also needs to optimize the modification of the requirement of the user by the offline process or else the on-line method as well as ensure the better connectivity of the resource. Hybrid Technique: A hybrid technique can be proposed for enhancement of the data confidentiality as well as integrity that primarily uses both sharing and validation practice. However, the process of relating between the user and supplier of cloud service can be augmented and be made more secure by way of utilizing potent sharing as well as authentication procedures. For instance, the RSA public algorithm can very well be utilized for the purpose of better safe and sound distribution of the different keys among the user along with the suppliers of cloud service (Baun, 2011). Data concealment might also possibly be utilized for the purpose of maintaining the confidentiality of data in the system of cloud service layers (Shroff, 2010). However, the process of data concealment techniques can be merged with the real data along with the ocular fake data in order to fake the volume of the actual data. Nevertheless, the endorsed users can without difficulty make a distinction and disconnect the forged data from the actual data. Therefore, it can be hereby ascertained that the techniques of Data concealment can particularly increase the on the whole the volume of real data and thereby offer improved security for the confidential data. Again, the purpose of data concealment is primarily to ensure that the real data can be fortified from different malicious users and intruders.Watermarking method can accordingly act as a key for the actual data and help in data concealment (Shroff, 2010). By way of deployment of this watermarking method, just the certified users c an have the key of watermarking and thereby ensure verification of users with the intention and purpose to make it certain that the actual data can be accessed only by the authentic users. Deletion confirmation essentially implies that data cannot be retrieved when the end users delete data after confirmation of the act of deletion (Stanoevska-Slabeva et al., 2010). However, the present challenge is very grave as more than one copy usually stays in the cloud for the purpose of security as well as handiness of data recovery. Therefore, at the time when the users usually delete the data with affirmation of deletion, the copies of data need to be deleted at that moment (Stanoevska-Slabeva et al., 2010). Yet, there remains certain data recovery technology that can help in recovering the data that has already been deleted by the authorised users from even the hard disks for maintenance of privacy. Consequently the proposed model need to have provision where the cloud storage supplier can make it certain that the deleted data from the end of the users cannot be recovered and accessed by any other unsubstantiated users or attackers. Therefore, a probable technique for avoidin g the breach of confidentiality and accessibility of data by the users can be to encrypt the particular data prior to uploading the same to the storage space in the cloud. FADE system that is essentially founded on the technologies, for instance the Ephemerize can help in encryption of the data prior to the process of uploading the same to the storage space (Stanoevska-Slabeva et al., 2010). Therefore, at the time when the users make a decision for deletion of their data this particular mechanism can apply the explicit strategy for the cloud storage space that includes replacement of the act or the function of deletion with new data. The most widespread atypical behaviour of untreated storage space is that the cloud service suppliers might abandon the updated data of the user that is again very challenging as it needs to be checked by only relying on the process of data encryption. Furthermore, a superior storage contract needs to sustain and uphold the synchronized alteration by several users. General Framework for the adoption of the proposed model The corporations can follow a specific framework for the purpose of adoption of the new model that can address the privacy as well as other security issues in the echelon of the cloud service provider. The corporations can follow simplistic framework that can integrate different functions that aims at addressing the issues of the present system. The structure of the proposed model refers to five different steps that include virtualization of the required infrastructure as well as applications, definition of the reference architecture. The consequent step as is reflected in the framework includes the foundation or basis for the scalable architecture. The subsequent step involves selection of the cloud and the deployment of system. The structure also involves manual provisioning as well as load balancing that forms the stage of the cloud exploitation. The last stage of the cloud computation framework model involves attainment of the sharing of application of different application workl oad, capacity arbitrage as well as self- service in addition to application provisioning. The current framework also needs to take into consideration different techniques of that the proposed model need to have. This includes the transformed methods of Homomorphic Encryption, Encrypted Search and Database, Distributive Storage, Hybrid Technique, Data Concealment, Deletion Confirmation. Therefore, the entire structure or framework for the adoption of the model starts from the virtualization and the process terminates with true cloud actualization. Another secure framework that can assure privacy as well as access control has been drawn in the diagram above. The above diagram presents a secure framework that can provide a secure environment that gives clients access to the network of the providers only through the secured VPN . However, the suppliers of the cloud service have several clients and might perhaps offer any of the three services that include Iaas, Paas as well as Saas or else integrated model that is the mixture of the three systems. In this present framework, the suppliers of the clod service can examine and validate the authentication of the user and ensure that only the authorized as well as genuine customers can approach the service providers. Once the cloud service providers become convinced about the credentials of the data of then consumers, the data can be encrypted or else stored. The framework for the new proposed model also needs to put forward the security policies, data handling process, penetration tes t, installation of firewalls as well as network security, secure the physical infrastructure, services such as personalizations as well as log detail, audit instruments offered by the providers to the cloud clients. Implementation of the model The process of implementation of the proposed model involves several stages that need to be conducted for the particular process. The management process for the implementation of the model first needs to analyse and determine the readiness of the application for the infrastructure for the cloud that in turn can bring about appropriate benefits (Ray, 2011). This actually implies evaluation of the potential service providers, analysis of the readiness of the important applications that can also provide recommendations for improvement. This step essentially refers to the process of designing and modelling the technique for the cloud computing. The second step refers to entrusting a service representative for dealing with the service providers and makes the supplier understand the requirement of the user and thereafter entrusting numerous data of the corporation in order to consult various things (Ray, 2011).. The subsequent step involves the acquiring the ownership and getting access to the data. The application as well as the hardware along with the operating system can be acquired by the service suppliers (Ray, 2011). Nevertheless, the data is actually the intellectual property of the business that can be recognized in the contract. This contract can help the business to take back the data provided to the service provider at any time the business wants. The consequent step involves the handling the fluctuating and the dynamic volume of the data. The business can deploy additional resources for supplementary power as well as added storage spaces that can enhance the power of the entire project of implementation of the entire project. The next step of implementation of the project refers to the performance of the gap analysis by the business. The gap analysis can thereby help in identification of the definite requirements that complies with the appropriate norms as well as the set of rules that can be provided by the cloud service suppliers (Ray, 2011). Next stage of implementation of the new project refers to the evaluation of the entire cost of the project. The process of migration as well as the overhead costs can widely differ founded on the target platform of the cloud that in turn can help in determining the approximated savings in cost. The cost can essentially involve the capital expenditure as well as the functional expenditure in addition to the overhead costs that is associated to the process of migration. In addition to this, the implementation process also involves checking different standards that include the Cloud Security Alliance, Internet Engineering task Force along with the Storage Networking Industry association (Ray, 2011). The implementation of the proposed model for high level security needs to implement four different layers that include the user layer, service provider layer, virtualization layer together with the data centre layer (Stanoevska-Slabeva et al., 2010). The management of the business also need to determine the migration strategy for understanding the different options available by establishing different business priorities and lastly transforming the current strategy that helps in delivering right balance between cost and the different identified priorities of the business (Taborda, 2011). The management also need to agree with the downtime and agree to a service level agreement so that the service suppliers can certify the uptime and the entire process of dealing with the downtime needs to be identified in the strategy. The management of the business also need to frame a detailed plan after consultation with the service provider for the purpose of explaining the plan to the vendor for ensuring the efficiency of the as well as enhancing the security of the proposed system. Evaluation of the implementation The process of evaluation refers to the process of monitoring the entire process of implementation of the proposed model that can ensure greater degree of privacy and better control techniques for accessibility of data in the cloud (Taborda, 2011). The process of evaluation involves the examination of the technology that is getting implemented for the business. The business also needs to acquire good understanding about the processes as well as infrastructure that is getting integrated with the business process. The business also need to have the know-how in order to understand the current system can appropriately store, handle the sharing of data in a secured way and analyse the critical characteristics of the new application that can handle the privacy concerns and carry out the secured process of cloud computing. Conclusion The above segment helps in understanding the entire issues related to the privacy and the accessibility control mechanisms of the cloud technologies. The above study also helps in understanding the concepts and the mechanisms of the cloud computation and the associated security threats and helps in development of a new proposed model base on the analysis of the limitations of the existing models. Thereafter, the present study also outlines the process of implementation of the new proposed model along with the ways of evaluation of the entire procedure of implementation. References Bansal, V. (2013).Enterprise resource planning. New Dehli: Dorling Kindersley (India). Baun, C. (2011).Cloud computing. New York: Springer. Carstensen, J., Morgenthal, J., Golden, B. (2012).Cloud Computing. Ely: IT Governance Publishing. Carvalho, R. Johansson, B. (2012).Free and open source enterprise resource planning. Hershey, PA: Business Science Reference. Chhabra, S. Muneesh Kumar., (2011).Strategic enterprise resource planning models for e-government. Hershey PA: Information Science Reference. Cloud computing strategy. (2012). [Washington, D.C.?]. Ganesh, L. Mehta, A. (2012).Enterprise resource planning project. New Delhi: Discovery Pub. House. Hossain, L., Patrick, J. Rashid, M. (2012).Enterprise resource planning. Hershey, PA: Idea Group Publishing/Information Science Publishing. Leon, A. (2014).Enterprise resource planning. New Delhi: McGraw-Hill Education (India) Pte Ltd. Mahmood, Z. Hill, R. (2011).Cloud computing for enterprise architectures. London: Springer. Markham, S. Webb, J. (2012). User Adoption of Enterprise Resource Planning Systems.ITNOW, 54(1), pp.40-40. Marks, E. Lozano, B. (2010).Executive's guide to cloud computing. Hoboken, N.J.: Wiley. Mell, P. Grance, T. (2011).The NIST definition of cloud computing. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. Monk, E. Wagner, B. (2012).Concepts in enterprise resource planning. Australia: Course Technology. Olson, D. Staley, J. (2012). Case study of open-source enterprise resource planning implementation in a small business.Enterprise Information Systems, 6(1), pp.79-94. Ray, R. (2011).Enterprise resource planning. New Delhi (India): Mcgraw-Hill Pub. Shroff, G. (2010).Enterprise cloud computing. Cambridge: Cambridge University Press. Stanoevska-Slabeva, K., Wozniak, T., Ristol, S. (2010).Grid and cloud computing. Heidelberg: Springer. Sumner, M. (2014).Enterprise resource planning. Harlow: Pearson Educational Limited. Taborda, L. (2011).Enterprise Release Management. Norwood: Artech House. Vicat-Blanc, P. (2011).Computing networks. London: ISTE. Williams, M. (2010).A quick start guide to cloud computing. London: Kogan Page.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.