Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/6390
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Awantika | - |
dc.contributor.author | Neha Rawat | - |
dc.date.accessioned | 2024-02-27T05:57:07Z | - |
dc.date.available | 2024-02-27T05:57:07Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/6390 | - |
dc.description.abstract | Cloud computing is becoming a fundamental part of Information Technology. Resource sharing is a pure plug and play model that effectively simplifies infrastructure planning. This is the aim of cloud computing. The two key advantages of this model are ease- of-use and cost-effectiveness. | - |
dc.publisher | i-manager's Journal on Cloud Computing | - |
dc.title | Cloud Computing- Security and Applications | - |
dc.vol | Vol. 1 | - |
dc.issued | No. 2 | - |
Appears in Collections: | Articles to be qced |
Files in This Item:
File | Size | Format | |
---|---|---|---|
CLOUD COMPUTING SECURITY AND APPLICATIONS.pdf Restricted Access | 2.66 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.