Big Data and Cloud: Trust, Security and Privacy, Abdulrahman Yarali
Автор: Siani Pearson; George Yee Название: Privacy and Security for Cloud Computing ISBN: 1447157931 ISBN-13(EAN): 9781447157939 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: In this book, leading experts analyze advances in privacy, security and risk technologies in cloud computing environments, including security, enterprise risk management and more, offering both a solid overview of the field and novel, cutting-edge research.
Описание: This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017.
Описание: The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017).- MTIV: A Trustworthiness Determination Approach for Threat Intelligence.- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV.- Secure Transfer Protocol Between App and Device of Internet of Things.- Rogue Access Points Detection Based on Theory of SemiSupervised Learning.- Phishing Detection Method Based on Borderline-Smote Deep Belief Network.- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network.- A SYN Flood Detection Method Based on Self - similarity in Network Traffic.- Annotating Network Service Fault based on Temporal Interval Relations.- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017).- An Anonymous Identity-Based Authentication Scheme in Vector Network.- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017).- Two Improved Anonymous Authentication Methods for PCS.- Multi-Match Segments Similarity Join Algorithm Based on MapReduce.- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser.- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.- Game Theoretical Analysis on System Adoption and Acceptance: A Review.- A Novel Bivariate Entropy-based Network Anomaly Detection System.- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.- Neural Network based Web Log Analysis for Web Intrusion Detection.- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017).- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach.- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis.- Cloud Ownership and Reliability - Issues and Developments.- A Trust-based Service Self-Organizing Model for Cloud Market.- A Reliable Resource Scheduling for Network Function Virtualization.- On Global Resource Allocation in Clusters for Data Analytics.- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors.- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017).- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks.- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways.- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things.- Localizing Wireless Jamming Attacks with Minimal Network Resources.- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017).- An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm.- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm.- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET).- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design.- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home.- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks.- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster.- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks.- An FPGA-based Algorithm to Accelerate Regular Expression Matching.- A Collaborative Filtering Recommendation Algorithm Based on Score Classification.- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine.-
Автор: Wang Lizhe, Ren Wei, Choo Kim-Kwang Raymond Название: Security and Privacy for Big Data, Cloud Computing and Applications ISBN: 1785617478 ISBN-13(EAN): 9781785617478 Издательство: Неизвестно Рейтинг: Цена: 25749.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors share their expertise in their respective chapters on a broad range of security and privacy challenges and state of the art solutions.
Описание: This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services.
Автор: Jiafu Wan; Kai Lin; Delu Zeng; Jin Li; Yang Xiang; Название: Cloud Computing, Security, Privacy in New Computing Environments ISBN: 3319696041 ISBN-13(EAN): 9783319696041 Издательство: Springer Рейтинг: Цена: 6988.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.
Автор: Theo Tryfonas; Ioannis Askoxylakis Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319203754 ISBN-13(EAN): 9783319203751 Издательство: Springer Рейтинг: Цена: 12298.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Authentication.- Cybersecurity.- Privacy, security and user behaviour.- Security in social media and smart technologies.- Security Technologies.
Автор: Kerschbaum Название: Data and Applications Security and Privacy XXXII ISBN: 3319957287 ISBN-13(EAN): 9783319957289 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions.
Автор: Simon N. Foley Название: Data and Applications Security and Privacy XXXIII ISBN: 3030224783 ISBN-13(EAN): 9783030224783 Издательство: Springer Рейтинг: Цена: 10482.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2019, held in Charleston, SC, USA, in July 2018.The 21 full papers presented were carefully reviewed and selected from 52 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on attacks, mobile and Web security, privacy, security protocol practices, distributed systems, source code security, and malware.
Автор: Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare Название: Impact of Digital Transformation on Security Policies and Standards ISBN: 1799823679 ISBN-13(EAN): 9781799823674 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 28967.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.
Автор: Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare Название: Impact of Digital Transformation on Security Policies and Standards ISBN: 1799823687 ISBN-13(EAN): 9781799823681 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 24116.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.
Автор: Sergei Petrenko Название: Big data technologies for monitoring of computer security : ISBN: 3319790358 ISBN-13(EAN): 9783319790350 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system.
Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well.
With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru