Information Security in Diverse Computing Environments