Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
Cloud computing is becoming increasingly important in Information Technology (IT) as an enabler for improved productivity, efficiency and cost reduction. It is expected to offer benefits for public sector organisations and government agencies. Cloud computing has the potential to improve the reliabi...
| Main Author: | Al-Zaidi., Qusay Kanaan Kadhim |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/24855/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=117107 |
| Abstract | Abstract here |
Similar Items
Cloud Computing For Iraqi Ministry Of Finance
by: Ahmed Dawod, Salman
Published: (2014)
by: Ahmed Dawod, Salman
Published: (2014)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Information security behaviour assessment in software-as-a-service cloud environment
by: Abdul Hamid, Hanifah
Published: (2018)
by: Abdul Hamid, Hanifah
Published: (2018)
Quality of service (QOS) in software defined networking (SDN) using bandwidth shaping in cloud computing / Mohd Izham Zamri
by: Zamri, Mohd Izham
Published: (2014)
by: Zamri, Mohd Izham
Published: (2014)
Cloud Computing Adoption Model For Higher Education : A Comparison Study Between Malaysia And Jordan
by: Mohammad Othman, Morad Yousef
Published: (2016)
by: Mohammad Othman, Morad Yousef
Published: (2016)
Modelling the intention to adopt cloud computing software as-a-service among IT professionals in Iraqi public organisations
by: Alsharifi, Hiba Jasim Hadi
Published: (2022)
by: Alsharifi, Hiba Jasim Hadi
Published: (2022)
Generic pattern recognition models based on EEG-MI brain computer interfaces for wheelchair steering control
by: Al-Qaysi, Ziadoon Tareq AbdulWahhab
Published: (2020)
by: Al-Qaysi, Ziadoon Tareq AbdulWahhab
Published: (2020)
Investigation on the occurrence of tles associated positive cloud to ground (+CG) lightning in UMP Pekan
by: Chan, Hwee Geem
Published: (2019)
by: Chan, Hwee Geem
Published: (2019)
Computational intelligence based power system security assessment and improvement under multicontigencies conditions
by: Nor Rul Hasma, Abdullah
Published: (2012)
by: Nor Rul Hasma, Abdullah
Published: (2012)
Analysis and optimal control of susceptible latent-breaking-out-countermeasure computer virus model / Mohammed Salem Mohammed Babusail
by: Mohammed Salem , Mohammed Babusail
Published: (2019)
by: Mohammed Salem , Mohammed Babusail
Published: (2019)
Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
by: Clement, Clarissa Terry
Published: (2015)
by: Clement, Clarissa Terry
Published: (2015)
Modeling and control of quartz crystal operated in liquid for bio-sensing application
by: A. Kadhim Fahad, Abu Abdullah
Published: (2014)
by: A. Kadhim Fahad, Abu Abdullah
Published: (2014)
Mobile Services in E-Government (M-Government): Mobile Traffic Infraction System.
by: Althunibat, Ahmad Abdallah Ishtaian
Published: (2007)
by: Althunibat, Ahmad Abdallah Ishtaian
Published: (2007)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Optimization Of Diebond And Wirebond To Improve Non Stick On Pad Issue
by: Musa, Khaliza
Published: (2020)
by: Musa, Khaliza
Published: (2020)
Computation of design and performance of switched reluctance motors
by: Md Saad, Malek Pisol
Published: (1995)
by: Md Saad, Malek Pisol
Published: (1995)
The trust issue in cloud storage security / Sufian Musa
by: Musa, Sufian
Published: (2018)
by: Musa, Sufian
Published: (2018)
Elimination Of Metal Stiffener Lifted Issue In Flexible Printed Circuit Board
by: Safri, Syarnila
Published: (2020)
by: Safri, Syarnila
Published: (2020)
Implementation Of Low Power Active Security
by: Krishnasamy, Raj Kumar
Published: (2017)
by: Krishnasamy, Raj Kumar
Published: (2017)
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
by: Biju, Issac
Published: (2008)
by: Biju, Issac
Published: (2008)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
Cloud Computing in Higher Institution: A Tool to Calculate Total Cost of Ownership Comparison Between Traditional Computing and Cloud Computing
by: Nur Liana, Che Omar
Published: (2012)
by: Nur Liana, Che Omar
Published: (2012)
Mobile Tender (M-Tender) For Public Work Department Within Malaysian Government.
by: Zahrawi, Ali Ahmad Deeb
Published: (2007)
by: Zahrawi, Ali Ahmad Deeb
Published: (2007)
The extension of organisational readiness model towards technology migration : A case of IPV6 migration
by: Main, Aspalilla
Published: (2017)
by: Main, Aspalilla
Published: (2017)
The Awareness Of Information Security Breach Among User IT In KPTMBP
by: Othman, Intan Safina
Published: (2016)
by: Othman, Intan Safina
Published: (2016)
Design And Analysis Of Auto Security Door Locking System
by: Lim, Si Qing
Published: (2016)
by: Lim, Si Qing
Published: (2016)
Prevention And Detection Mechanism For Security In Passive Rfid System
by: Khor, Jing Huey
Published: (2013)
by: Khor, Jing Huey
Published: (2013)
Connection siemens PLC (programmable logic control) to labview using OPC (ole for process control)
by: Mahfuzah, Mustafa
Published: (2004)
by: Mahfuzah, Mustafa
Published: (2004)
Load frequency control using adaptive and fuzzy based controller for hybrid micro-grid system
by: Mahdi, Mazin Mustafa
Published: (2018)
by: Mahdi, Mazin Mustafa
Published: (2018)
Positioning Control Of An Ironless Linear Motor With Continuous Motion Nominal Characteristic Trajectory Following Controller
by: Foo,, Jia En
Published: (2017)
by: Foo,, Jia En
Published: (2017)
Computer vision-based vehicle recognition system using deep learning techniques / Tan Shi Hao
by: Tan , Shi Hao
Published: (2024)
by: Tan , Shi Hao
Published: (2024)
Study of non-invasive cognitive tasks and feature extraction techniques for brain-computer interface (BCI) applications
by: Mamunur, Rashid
Published: (2020)
by: Mamunur, Rashid
Published: (2020)
Identification and analysis of human physical exercise postures using computer vision and deep learning / Sriram Krishnamoorthy
by: Sriram , Krishnamoorthy
Published: (2021)
by: Sriram , Krishnamoorthy
Published: (2021)
Power sharing conditioning control in single-phase parallel distributed generations with simple improvement of droop control
by: Jackson, Ronald
Published: (2019)
by: Jackson, Ronald
Published: (2019)
An Automated Approach To Elicit And Validate Security Requirements Of Mobile Application
by: Yusop, Noorrezam
Published: (2018)
by: Yusop, Noorrezam
Published: (2018)
Computational intelligence based technique for congestion management and compensation scheme in power system / Nur Zahirah Mohd Ali
by: Mohd Ali, Nur Zahirah
Published: (2019)
by: Mohd Ali, Nur Zahirah
Published: (2019)
Modified fractional order sliding mode control for speed control of permanent magnet synchronous motor / Fardila Mohd Zaihidee
by: Fardila , Mohd Zaihidee
Published: (2020)
by: Fardila , Mohd Zaihidee
Published: (2020)
Optimisation of automatic generation control performance in two-area power system with pid controllers using mepso / Lu Li
by: Lu , Li
Published: (2018)
by: Lu , Li
Published: (2018)
A model of security awareness in cloud computing
by: Abdul Ghafar Jaafar
Published: (2025)
by: Abdul Ghafar Jaafar
Published: (2025)
A Web-Based Computer Lab Management System: Case Study in Sekolah Kebangsaan Tikam Batu, Sungai Petani
by: Siti Fatimah, Baharum
Published: (2012)
by: Siti Fatimah, Baharum
Published: (2012)
Similar Items
-
Cloud Computing For Iraqi Ministry Of Finance
by: Ahmed Dawod, Salman
Published: (2014) -
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020) -
Information security behaviour assessment in software-as-a-service cloud environment
by: Abdul Hamid, Hanifah
Published: (2018) -
Quality of service (QOS) in software defined networking (SDN) using bandwidth shaping in cloud computing / Mohd Izham Zamri
by: Zamri, Mohd Izham
Published: (2014) -
Cloud Computing Adoption Model For Higher Education : A Comparison Study Between Malaysia And Jordan
by: Mohammad Othman, Morad Yousef
Published: (2016)