Security and privacy for big data, cloud computing and applications:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London, United Kingdom
<<The>>Institution of Engineering and Technology
2019
|
Schriftenreihe: | IET computing series
28 |
Schlagworte: | |
Online-Zugang: | FWS01 FWS02 UBT01 UBY01 UER01 Volltext |
Beschreibung: | 1 Online-Ressource (330 Seiten) Illustrationen, Diagramme |
ISBN: | 9781785617485 |
DOI: | 10.1049/PBPC028E |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV046358869 | ||
003 | DE-604 | ||
005 | 20210723 | ||
007 | cr|uuu---uuuuu | ||
008 | 200128s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781785617485 |c Online |9 978-1-78561-748-5 | ||
024 | 7 | |a 10.1049/PBPC028E |2 doi | |
035 | |a (OCoLC)1140157958 | ||
035 | |a (DE-599)BVBBV046358869 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29 |a DE-863 |a DE-862 |a DE-703 |a DE-706 | ||
245 | 1 | 0 | |a Security and privacy for big data, cloud computing and applications |c edited by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo and Fatos Xhafa |
264 | 1 | |a London, United Kingdom |b <<The>>Institution of Engineering and Technology |c 2019 | |
300 | |a 1 Online-Ressource (330 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IET computing series |v 28 | |
650 | 4 | |a mobile radio | |
650 | 4 | |a social networking (online) | |
650 | 4 | |a Internet | |
650 | 4 | |a authorisation | |
650 | 4 | |a cryptography | |
650 | 4 | |a telecommunication security | |
650 | 4 | |a cloud computing | |
650 | 4 | |a security of data | |
650 | 4 | |a data privacy | |
650 | 4 | |a Big Data | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data protection | |
650 | 4 | |a Internet | |
650 | 4 | |a Mobile communication systems | |
650 | 4 | |a Privacy | |
650 | 4 | |a Telecommunication / Security measures | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Internet |2 fast | |
650 | 7 | |a Mobile communication systems |2 fast | |
650 | 7 | |a Privacy |2 fast | |
650 | 7 | |a Telecommunication / Security measures |2 fast | |
650 | 7 | |a authorisation |2 inspect | |
650 | 7 | |a Big Data |2 inspect | |
650 | 7 | |a cloud computing |2 inspect | |
650 | 7 | |a cryptography |2 inspect | |
650 | 7 | |a data privacy |2 inspect | |
650 | 7 | |a Internet |2 inspect | |
650 | 7 | |a mobile radio |2 inspect | |
650 | 7 | |a social networking (online) |2 inspect | |
650 | 7 | |a telecommunication security |2 inspect | |
700 | 1 | |a Ren, Wei |4 edt | |
700 | 1 | |a Wang, Lizhe |4 edt | |
700 | 1 | |a Choo, Kim-Kwang Raymond |e Sonstige |0 (DE-588)137128738 |4 oth | |
700 | 1 | |a Xhafa, Fatos |e Sonstige |0 (DE-588)1136688560 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78561-747-8 |
830 | 0 | |a IET computing series |v 28 |w (DE-604)BV047153236 |9 28 | |
856 | 4 | 0 | |u https://doi.org/10.1049/PBPC028E |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-100-IET | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031735209 | ||
966 | e | |u https://doi.org/10.1049/PBPC028E |l FWS01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBPC028E |l FWS02 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBPC028E |l UBT01 |p ZDB-100-IET |q UBT_PDA_IET_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBPC028E |l UBY01 |p ZDB-100-IET |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBPC028E |l UER01 |p ZDB-100-IET |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 847806 |
---|---|
_version_ | 1824554988003655680 |
any_adam_object | |
author2 | Ren, Wei Wang, Lizhe |
author2_role | edt edt |
author2_variant | w r wr l w lw |
author_GND | (DE-588)137128738 (DE-588)1136688560 |
author_facet | Ren, Wei Wang, Lizhe |
building | Verbundindex |
bvnumber | BV046358869 |
collection | ZDB-100-IET |
ctrlnum | (OCoLC)1140157958 (DE-599)BVBBV046358869 |
doi_str_mv | 10.1049/PBPC028E |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03086nmm a2200817 cb4500</leader><controlfield tag="001">BV046358869</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210723 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200128s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785617485</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78561-748-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1049/PBPC028E</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1140157958</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046358869</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy for big data, cloud computing and applications</subfield><subfield code="c">edited by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo and Fatos Xhafa</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London, United Kingdom</subfield><subfield code="b"><<The>>Institution of Engineering and Technology</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (330 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IET computing series</subfield><subfield code="v">28</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">mobile radio</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">social networking (online)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">authorisation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">telecommunication security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">security of data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">data privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big Data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile communication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authorisation</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Big Data</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cloud computing</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptography</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">data privacy</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">mobile radio</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">social networking (online)</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">telecommunication security</subfield><subfield code="2">inspect</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ren, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Lizhe</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choo, Kim-Kwang Raymond</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)137128738</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xhafa, Fatos</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1136688560</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78561-747-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IET computing series</subfield><subfield code="v">28</subfield><subfield code="w">(DE-604)BV047153236</subfield><subfield code="9">28</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-100-IET</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031735209</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="q">UBT_PDA_IET_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBPC028E</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046358869 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T07:00:30Z |
institution | BVB |
isbn | 9781785617485 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031735209 |
oclc_num | 1140157958 |
open_access_boolean | |
owner | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 |
owner_facet | DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-703 DE-706 |
physical | 1 Online-Ressource (330 Seiten) Illustrationen, Diagramme |
psigel | ZDB-100-IET ZDB-100-IET UBT_PDA_IET_Kauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | <<The>>Institution of Engineering and Technology |
record_format | marc |
series | IET computing series |
series2 | IET computing series |
spellingShingle | Security and privacy for big data, cloud computing and applications IET computing series mobile radio social networking (online) Internet authorisation cryptography telecommunication security cloud computing security of data data privacy Big Data Cloud computing Cryptography Data protection Mobile communication systems Privacy Telecommunication / Security measures Cloud computing fast Cryptography fast Data protection fast Internet fast Mobile communication systems fast Privacy fast Telecommunication / Security measures fast authorisation inspect Big Data inspect cloud computing inspect cryptography inspect data privacy inspect Internet inspect mobile radio inspect social networking (online) inspect telecommunication security inspect |
title | Security and privacy for big data, cloud computing and applications |
title_auth | Security and privacy for big data, cloud computing and applications |
title_exact_search | Security and privacy for big data, cloud computing and applications |
title_full | Security and privacy for big data, cloud computing and applications edited by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo and Fatos Xhafa |
title_fullStr | Security and privacy for big data, cloud computing and applications edited by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo and Fatos Xhafa |
title_full_unstemmed | Security and privacy for big data, cloud computing and applications edited by Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo and Fatos Xhafa |
title_short | Security and privacy for big data, cloud computing and applications |
title_sort | security and privacy for big data cloud computing and applications |
topic | mobile radio social networking (online) Internet authorisation cryptography telecommunication security cloud computing security of data data privacy Big Data Cloud computing Cryptography Data protection Mobile communication systems Privacy Telecommunication / Security measures Cloud computing fast Cryptography fast Data protection fast Internet fast Mobile communication systems fast Privacy fast Telecommunication / Security measures fast authorisation inspect Big Data inspect cloud computing inspect cryptography inspect data privacy inspect Internet inspect mobile radio inspect social networking (online) inspect telecommunication security inspect |
topic_facet | mobile radio social networking (online) Internet authorisation cryptography telecommunication security cloud computing security of data data privacy Big Data Cloud computing Cryptography Data protection Mobile communication systems Privacy Telecommunication / Security measures |
url | https://doi.org/10.1049/PBPC028E |
volume_link | (DE-604)BV047153236 |
work_keys_str_mv | AT renwei securityandprivacyforbigdatacloudcomputingandapplications AT wanglizhe securityandprivacyforbigdatacloudcomputingandapplications AT chookimkwangraymond securityandprivacyforbigdatacloudcomputingandapplications AT xhafafatos securityandprivacyforbigdatacloudcomputingandapplications |