I'm thinking about doing academic project on Intrusion detection and prevention system on cloud computing. I also want to know how it can be successfuly conducted. Anyone having ideas on this topic would be much appreciated.

Similar questions and discussions