Details
Title | Handbook of research on cloud computing and big data applications in IoT |
---|---|
Other creators | Gupta B. B., |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Cloud computing. ; Big data. ; Internet of things. ; COMPUTERS / Computer Literacy ; COMPUTERS / Computer Science ; COMPUTERS / Data Processing ; COMPUTERS / Hardware / General ; COMPUTERS / Information Technology ; COMPUTERS / Machine Theory ; COMPUTERS / Reference ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1090540741 |
Record create date | 3/25/2019 |
Allowed Actions
pdf/2090033.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/2090033.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. It also explores big data applications in IoT"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Title Page
- Copyright Page
- Book Series
- Dedication
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Detailed Table of Contents
- Foreword
- Preface
- Acknowledgment
- Chapter 1: Resource Management and Scheduling for Big Data Applications in Cloud Computing Environments
- Chapter 2: On the Use of System-Level Benchmarks for Comparing Public Cloud Environments
- Chapter 3: Adversarial Attacks and Defense on Deep Learning Models for Big Data and IoT
- Chapter 4: Big Data Analytics
- Chapter 5: Tier Application in Multi-Cloud Databases to Improve Security and Service Availability
- Chapter 6: Achieving Secure and Privacy-Preserving in Mobile Social Networks
- Chapter 7: Adversarial Attacks and Defenses in Malware Detection Classifiers
- Chapter 8: A Privacy-Preserving Feature Extraction Method for Big Data Analytics Based on Data-Independent Reusable Projection
- Chapter 9: An API for Development of User-Defined Scheduling Algorithms in Aneka PaaS Cloud Software
- Chapter 10: A Cloud-Based Patient Health Monitoring System Using the Internet of Things
- Chapter 11: Statistical Modelling and Analysis of the Computer-Simulated Datasets
- Chapter 12: Evaluation of Reliable Data Storage in Cloud Using an Efficient Encryption Technique
- Chapter 13: Enabling Technologies for IoT
- Chapter 14: A System for Natural Language Interaction With the Heterogeneous Information Network
- Chapter 15: Fog Computing
- Chapter 16: Survey on Industrial Internet of Things (IoT) Threats and Security
- Chapter 17: Chaos Theory and Systems in Cloud Content Security
- Chapter 18: A Study on Recent Trends in Cloud-Based Data Processing for IoT Era
- Chapter 19: A Perspective on Using Blockchain for Ensuring Security in Smart Card Systems
- Chapter 20: Delay Tolerant Networks
- Chapter 21: The Impact of Internet of Things Self-Security on Daily Business and Business Continuity
- Chapter 22: Survey on Various MapReduce Scheduling Algorithms
- Chapter 23: Software-Defined Networks (SDN)
- Compilation of References
- About the Contributors
- Index