
Resource Optimization and Security for Cloud Services, Wiley, 2014 مطلبها Chapter 1. Introduction . . . . . . . . . . . . . . . . . . 11.1. Motivation . . . . . . . . . . . . . . . . . . . . . . . . 11.2. The problems . . . . . . . . . . . . . . . . . . . . . . 41.3. Summary of contributions . . . . . . . . . . . . . . 91.4. The organization of this book . . . . . . . . . . . . 11Chapter 2. Current Approaches for ResourceOptimization and Security . . . . . . . . . . . . . . . . 132.1. Service av ...