As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
"synopsis" may belong to another edition of this title.
Wei Ren is a full Professor at the School of Computer Science, China University of Geosciences (Wuhan), China.
Lizhe Wang is a "ChuTian" Chair Professor at School of Computer Science, China Univ. of Geosciences (CUG).
Kim-Kwang Raymond Choo holds the Cloud Technology Endowed Professorship at the University of Texas at San Antonio, USA.
Fatos Xhafa holds a permanent position of Professor Titular d'Universitat (Hab. Full Professor) at the Departament de Ciències de la Computació, Universitat Politècnica de Catalunya, Barcelona, Spain.
"About this title" may belong to another edition of this title.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26376473970
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 38727888-n
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Hardback. Condition: New. As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing. Seller Inventory # LU-9781785617478
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. Seller Inventory # 18376473976
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781785617478
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 38727888
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 38727888-n
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 38727888
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781785617478
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781785617478