Details
Title | Advances in information security, privacy, and ethics (AISPE) book series. — Security, privacy, and forensics issues in big data |
---|---|
Other creators | Joshi R. C., ; Gupta Brij |
Organization | IGI Global, |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Big data. ; Cyber intelligence (Computer security) ; Privacy, Right of. ; Digital forensic science. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1112162229 |
Record create date | 8/13/2019 |
Allowed Actions
pdf/2227888.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/2227888.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Cover
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- Table of Contents
- Detailed Table of Contents
- Preface
- Acknowledgment
- Chapter 1: Securing the Cloud for Big Data
- Chapter 2: Big Data
- Chapter 3: Human Factors in Cybersecurity
- Chapter 4: Security and Privacy Challenges in Big Data
- Chapter 5: Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications
- Chapter 6: Security Vulnerabilities, Threats, and Attacks in IoT and Big Data
- Chapter 7: Threat Hunting in Windows Using Big Security Log Data
- Chapter 8: Nature-Inspired Techniques for Data Security in Big Data
- Chapter 9: Bootstrapping Urban Planning
- Chapter 10: Securing Online Bank's Big Data Through Block Chain Technology
- Chapter 11: Enhance Data Security and Privacy in Cloud
- Chapter 12: The Unheard Story of Organizational Motivations Towards User Privacy
- Chapter 13: Botnet and Internet of Things (IoTs)
- Chapter 14: A Conceptual Model for the Organizational Adoption of Information System Security Innovations
- Chapter 15: Theoretical Foundations of Deep Resonance Interference Network
- Chapter 16: Malware Threat in Internet of Things and Its Mitigation Analysis
- Chapter 17: Leveraging Fog Computing and Deep Learning for Building a Secure Individual Health-Based Decision Support System to Evade Air Pollution
- Compilation of References
- About the Contributors
- Index