Secure Data Deletion
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author...
| Main Author: | Reardon, Joel (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2016.
|
| Series: | Information Security and Cryptography,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Towards Hardware-Intrinsic Security Foundations and Practice /
Published: (2010) -
Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits /
by: Peeters, Eric
Published: (2013) -
Physical Unclonable Functions in Theory and Practice
by: Böhm, Christoph, et al.
Published: (2013) -
Future Information Technology - II
Published: (2015) -
Future Information Technology FutureTech 2014 /
Published: (2014)