Security, privacy, and forensics issues in big data:
"This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 URL des Erstveröffentlichers |
Zusammenfassung: | "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522597445 |
DOI: | 10.4018/978-1-5225-9742-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046203737 | ||
003 | DE-604 | ||
005 | 20211110 | ||
007 | cr|uuu---uuuuu | ||
008 | 191017s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781522597445 |9 978-1-5225-9744-5 | ||
035 | |a (OCoLC)1124789820 | ||
035 | |a (DE-599)BVBBV046203737 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Security, privacy, and forensics issues in big data |c Ramesh C. Joshi, Brij B. Gupta |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada | |
520 | |a "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- | ||
650 | 4 | |a Big data | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Digital forensic science | |
650 | 7 | |a Big data |2 fast | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Digital forensic science |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Big Data |0 (DE-588)4802620-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Big Data |0 (DE-588)4802620-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Joshi, R. C. |0 (DE-588)144028212 |4 edt | |
700 | 1 | |a Gupta, Brij |d 1982- |0 (DE-588)1103817469 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-9742-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, softcover |z 978-1-5225-9743-8 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-9742-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-9742-1 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9742-1 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9742-1 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9742-1 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076705999585280 |
---|---|
adam_text | |
any_adam_object | |
author2 | Joshi, R. C. Gupta, Brij 1982- |
author2_role | edt edt |
author2_variant | r c j rc rcj b g bg |
author_GND | (DE-588)144028212 (DE-588)1103817469 |
author_facet | Joshi, R. C. Gupta, Brij 1982- |
building | Verbundindex |
bvnumber | BV046203737 |
classification_rvk | ST 276 |
collection | ZDB-98-IGB |
contents | Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada |
ctrlnum | (OCoLC)1124789820 (DE-599)BVBBV046203737 |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-9742-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046203737</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211110</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191017s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522597445</subfield><subfield code="9">978-1-5225-9744-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1124789820</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046203737</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy, and forensics issues in big data</subfield><subfield code="c">Ramesh C. Joshi, Brij B. Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Big data</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital forensic science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Big Data</subfield><subfield code="0">(DE-588)4802620-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joshi, R. C.</subfield><subfield code="0">(DE-588)144028212</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1103817469</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-9742-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, softcover</subfield><subfield code="z">978-1-5225-9743-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-9742-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9742-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9742-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9742-1</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9742-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046203737 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:01:33Z |
institution | BVB |
isbn | 9781522597445 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031582805 |
oclc_num | 1124789820 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Security, privacy, and forensics issues in big data Ramesh C. Joshi, Brij B. Gupta Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- Big data Cyber intelligence (Computer security) Privacy, Right of Digital forensic science Big data fast Cyber intelligence (Computer security) fast Digital forensic science fast Privacy, Right of fast Datensicherung (DE-588)4011144-1 gnd rswk-swf Big Data (DE-588)4802620-7 gnd rswk-swf Big Data (DE-588)4802620-7 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Joshi, R. C. (DE-588)144028212 edt Gupta, Brij 1982- (DE-588)1103817469 edt Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-9742-1 Erscheint auch als Druck-Ausgabe, softcover 978-1-5225-9743-8 https://doi.org/10.4018/978-1-5225-9742-1 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Security, privacy, and forensics issues in big data Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada Big data Cyber intelligence (Computer security) Privacy, Right of Digital forensic science Big data fast Cyber intelligence (Computer security) fast Digital forensic science fast Privacy, Right of fast Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4802620-7 |
title | Security, privacy, and forensics issues in big data |
title_auth | Security, privacy, and forensics issues in big data |
title_exact_search | Security, privacy, and forensics issues in big data |
title_full | Security, privacy, and forensics issues in big data Ramesh C. Joshi, Brij B. Gupta |
title_fullStr | Security, privacy, and forensics issues in big data Ramesh C. Joshi, Brij B. Gupta |
title_full_unstemmed | Security, privacy, and forensics issues in big data Ramesh C. Joshi, Brij B. Gupta |
title_short | Security, privacy, and forensics issues in big data |
title_sort | security privacy and forensics issues in big data |
topic | Big data Cyber intelligence (Computer security) Privacy, Right of Digital forensic science Big data fast Cyber intelligence (Computer security) fast Digital forensic science fast Privacy, Right of fast Datensicherung (DE-588)4011144-1 gnd Big Data (DE-588)4802620-7 gnd |
topic_facet | Big data Cyber intelligence (Computer security) Privacy, Right of Digital forensic science Datensicherung Big Data |
url | https://doi.org/10.4018/978-1-5225-9742-1 |
work_keys_str_mv | AT joshirc securityprivacyandforensicsissuesinbigdata AT guptabrij securityprivacyandforensicsissuesinbigdata |