Big data security

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

Библиографическая информация
Другие авторы: Banerjee, Indradip, Bhattacharyya, Siddhartha, 1975-, Gupta, Shibakali
Формат: Электронная книга
Язык:English
Публикация: Berlin ; Boston De Gruyter, [2019]
Серии:De Gruyter frontiers in computational intelligence ; v. 3.
Предметы:
Online-ссылка:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03087cam a2200577Ii 4500
001 koha001014294
003 OCoLC
005 20250222070029.0
006 m d
007 cr mn|||||||||
008 191022t20192019gw a fob z000 0 eng d
035 |a koha001014294 
040 |a DEGRU  |b eng  |e rda  |e pn  |c DEGRU  |d EBLCP  |d N$T  |d YDX  |d YDXIT  |d IUL  |d OSU  |d OCLCQ  |d OCLCO  |d SFB  |d N$T 
019 |a 1133258813  |a 1133499565 
020 |a 9783110606058  |q (pdf) 
020 |a 3110606054  |q (pdf) 
020 |a 9783110605969  |q (electronic bk.) 
020 |a 3110605961  |q (electronic bk.) 
020 |z 9783110605884 
020 |z 3110605880 
024 7 |a 10.1515/9783110606058  |2 doi 
029 1 |a AU@  |b 000066975514 
050 4 |a QA76.9.A25  |b B55 2019 
072 7 |a COM021030  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a N$TA 
245 0 0 |a Big data security  |c edited by Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya 
264 1 |a Berlin ;  |a Boston  |b De Gruyter,  |c [2019] 
300 |a 1 online resource (ix, 144 pages)  |b illustrations 
347 |a text file  |b PDF  |2 rda 
490 1 |a De Gruyter Frontiers in Computational Intelligence ;  |v volume 3 
520 |a After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology 
504 |a Includes bibliographical references 
505 0 0 |t 1. Introduction /  |r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha --  |t 2. Digital identity protection using blockchain for academic qualification certificates /  |r Mrsic, Leo / Fijacko, Goran / Balkovic, Mislav --  |t 3. Anomaly detection in cloud big database metric /  |r Chowdhury, Souvik / Gupta, Shibakali --  |t 4. Use of big data in hacking and social engineering /  |r Gupta, Shibakali / Mukherjee, Ayan --  |t 5. Steganography, the widely used name for data hiding /  |r Mukherjee, Srilekha / Sanyal, Goutam --  |t 6. Big data security issues with challenges and solutions /  |r Koley, Santanu --  |t 7. Conclusions /  |r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha 
546 |a In English. 
588 0 |a Description based on online resource, title from digital title page (viewed on September 17, 2020). 
506 0 |a Open Access  |5 EbpS 
653 0 |a Big data  |x Security measures. 
653 7 |a COMPUTERS  |x Database Management  |x Data Mining.  |2 bisacsh 
655 0 |a EBSCO eBooks  |9 905790 
655 0 |a Electronic books.  |9 899821 
655 4 |a Electronic books.  |9 899821 
700 1 |a Banerjee, Indradip,  |9 913435 
700 1 |a Bhattacharyya, Siddhartha,  |d 1975-  |9 913417 
700 1 |a Gupta, Shibakali,  |9 913436 
830 0 |a De Gruyter frontiers in computational intelligence ;  |v v. 3.  |9 911816 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2330583.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1014294 
910 |a EBSCO eBooks 
999 |c 1014294  |d 1014294 
039