Big data security
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology
| Другие авторы: | , , |
|---|---|
| Формат: | Электронная книга |
| Язык: | English |
| Публикация: |
Berlin ; Boston
De Gruyter,
[2019]
|
| Серии: | De Gruyter frontiers in computational intelligence ;
v. 3. |
| Предметы: | |
| Online-ссылка: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 03087cam a2200577Ii 4500 | ||
|---|---|---|---|
| 001 | koha001014294 | ||
| 003 | OCoLC | ||
| 005 | 20250222070029.0 | ||
| 006 | m d | ||
| 007 | cr mn||||||||| | ||
| 008 | 191022t20192019gw a fob z000 0 eng d | ||
| 035 | |a koha001014294 | ||
| 040 | |a DEGRU |b eng |e rda |e pn |c DEGRU |d EBLCP |d N$T |d YDX |d YDXIT |d IUL |d OSU |d OCLCQ |d OCLCO |d SFB |d N$T | ||
| 019 | |a 1133258813 |a 1133499565 | ||
| 020 | |a 9783110606058 |q (pdf) | ||
| 020 | |a 3110606054 |q (pdf) | ||
| 020 | |a 9783110605969 |q (electronic bk.) | ||
| 020 | |a 3110605961 |q (electronic bk.) | ||
| 020 | |z 9783110605884 | ||
| 020 | |z 3110605880 | ||
| 024 | 7 | |a 10.1515/9783110606058 |2 doi | |
| 029 | 1 | |a AU@ |b 000066975514 | |
| 050 | 4 | |a QA76.9.A25 |b B55 2019 | |
| 072 | 7 | |a COM021030 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 049 | |a N$TA | ||
| 245 | 0 | 0 | |a Big data security |c edited by Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya |
| 264 | 1 | |a Berlin ; |a Boston |b De Gruyter, |c [2019] | |
| 300 | |a 1 online resource (ix, 144 pages) |b illustrations | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 1 | |a De Gruyter Frontiers in Computational Intelligence ; |v volume 3 | |
| 520 | |a After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology | ||
| 504 | |a Includes bibliographical references | ||
| 505 | 0 | 0 | |t 1. Introduction / |r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha -- |t 2. Digital identity protection using blockchain for academic qualification certificates / |r Mrsic, Leo / Fijacko, Goran / Balkovic, Mislav -- |t 3. Anomaly detection in cloud big database metric / |r Chowdhury, Souvik / Gupta, Shibakali -- |t 4. Use of big data in hacking and social engineering / |r Gupta, Shibakali / Mukherjee, Ayan -- |t 5. Steganography, the widely used name for data hiding / |r Mukherjee, Srilekha / Sanyal, Goutam -- |t 6. Big data security issues with challenges and solutions / |r Koley, Santanu -- |t 7. Conclusions / |r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha |
| 546 | |a In English. | ||
| 588 | 0 | |a Description based on online resource, title from digital title page (viewed on September 17, 2020). | |
| 506 | 0 | |a Open Access |5 EbpS | |
| 653 | 0 | |a Big data |x Security measures. | |
| 653 | 7 | |a COMPUTERS |x Database Management |x Data Mining. |2 bisacsh | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 0 | |a Electronic books. |9 899821 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 700 | 1 | |a Banerjee, Indradip, |9 913435 | |
| 700 | 1 | |a Bhattacharyya, Siddhartha, |d 1975- |9 913417 | |
| 700 | 1 | |a Gupta, Shibakali, |9 913436 | |
| 830 | 0 | |a De Gruyter frontiers in computational intelligence ; |v v. 3. |9 911816 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2330583.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1014294 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1014294 |d 1014294 | ||
| 039 | |||
