Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management:
"This book explores the applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management. It provides information on the topics of Big Data, Internet of Things, Mobile Technologies, Cloud Computing and Information Security"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management. It provides information on the topics of Big Data, Internet of Things, Mobile Technologies, Cloud Computing and Information Security"-- |
Beschreibung: | 20 PDFs (xvii, 300 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522540458 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00182365 | ||
003 | IGIG | ||
005 | 20180529124539.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180530s2018 pau fob 001 0 eng d | ||
010 | |z 2017027302 | ||
020 | |a 9781522540458 |q ebook | ||
020 | |z 9781522540441 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-4044-1 |2 doi | |
035 | |a (CaBNVSL)slc19716339 | ||
035 | |a (OCoLC)1038282196 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a T58.5 |b .A675 2018e | |
082 | 7 | |a 004 |2 23 | |
245 | 0 | 0 | |a Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management |c P. Karthikeyan and M. Thangavel, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2018] | |
300 | |a 20 PDFs (xvii, 300 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Role of security mechanisms in the building blocks of the cloud infrastructure -- Chapter 2. Energy optimization in cryptographic protocols for the cloud -- Chapter 3. A recent study on high dimensional features used in stego image anomaly detection -- Chapter 4. High efficient data embedding in image steganography using parallel programming -- Chapter 5. Analysis of mobile cloud computing: architecture, applications, challenges, and future perspectives -- Chapter 6. Mobile cloud computing: applications perspective -- Chapter 7. Processing IoT data: from cloud to fogit's time to be down to earth -- Chapter 8. Data classification and prediction -- Chapter 9. Ontology based feature extraction from text documents -- Chapter 10. Location-based advertising using location-aware data mining -- Chapter 11. Amelioration of big data analytics by employing big data tools and techniques -- Chapter 12. Recent development in big data analytics: research perspective. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management. It provides information on the topics of Big Data, Internet of Things, Mobile Technologies, Cloud Computing and Information Security"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/30/2018). | ||
650 | 0 | |a Computer networks. | |
650 | 0 | |a Information technology. | |
700 | 1 | |a Karthikeyan, P. |d 1981- |e editor. | |
700 | 1 | |a Thangavel, M. |d 1989- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017027302 | |
776 | 0 | 8 | |i Print version: |z 152254044X |z 9781522540441 |w (DLC) 2017027302 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4044-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00182365 |
---|---|
_version_ | 1816797079445438464 |
adam_text | |
any_adam_object | |
author2 | Karthikeyan, P. 1981- Thangavel, M. 1989- |
author2_role | edt edt |
author2_variant | p k pk m t mt |
author_facet | Karthikeyan, P. 1981- Thangavel, M. 1989- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.5 .A675 2018e |
callnumber-search | T58.5 .A675 2018e |
callnumber-sort | T 258.5 A675 42018E |
callnumber-subject | T - General Technology |
collection | ZDB-98-IGB |
contents | Chapter 1. Role of security mechanisms in the building blocks of the cloud infrastructure -- Chapter 2. Energy optimization in cryptographic protocols for the cloud -- Chapter 3. A recent study on high dimensional features used in stego image anomaly detection -- Chapter 4. High efficient data embedding in image steganography using parallel programming -- Chapter 5. Analysis of mobile cloud computing: architecture, applications, challenges, and future perspectives -- Chapter 6. Mobile cloud computing: applications perspective -- Chapter 7. Processing IoT data: from cloud to fogit's time to be down to earth -- Chapter 8. Data classification and prediction -- Chapter 9. Ontology based feature extraction from text documents -- Chapter 10. Location-based advertising using location-aware data mining -- Chapter 11. Amelioration of big data analytics by employing big data tools and techniques -- Chapter 12. Recent development in big data analytics: research perspective. |
ctrlnum | (CaBNVSL)slc19716339 (OCoLC)1038282196 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03074nam a2200457 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00182365</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180529124539.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180530s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017027302</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522540458</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522540441</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-4044-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc19716339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1038282196</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.5</subfield><subfield code="b">.A675 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management </subfield><subfield code="c">P. Karthikeyan and M. Thangavel, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (xvii, 300 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Role of security mechanisms in the building blocks of the cloud infrastructure -- Chapter 2. Energy optimization in cryptographic protocols for the cloud -- Chapter 3. A recent study on high dimensional features used in stego image anomaly detection -- Chapter 4. High efficient data embedding in image steganography using parallel programming -- Chapter 5. Analysis of mobile cloud computing: architecture, applications, challenges, and future perspectives -- Chapter 6. Mobile cloud computing: applications perspective -- Chapter 7. Processing IoT data: from cloud to fogit's time to be down to earth -- Chapter 8. Data classification and prediction -- Chapter 9. Ontology based feature extraction from text documents -- Chapter 10. Location-based advertising using location-aware data mining -- Chapter 11. Amelioration of big data analytics by employing big data tools and techniques -- Chapter 12. Recent development in big data analytics: research perspective.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management. It provides information on the topics of Big Data, Internet of Things, Mobile Technologies, Cloud Computing and Information Security"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/30/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karthikeyan, P.</subfield><subfield code="d">1981-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thangavel, M.</subfield><subfield code="d">1989-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017027302</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">152254044X</subfield><subfield code="z">9781522540441</subfield><subfield code="w">(DLC) 2017027302</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4044-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00182365 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:52Z |
institution | BVB |
isbn | 9781522540458 |
language | English |
oclc_num | 1038282196 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 20 PDFs (xvii, 300 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, |
record_format | marc |
spelling | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management P. Karthikeyan and M. Thangavel, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018] 20 PDFs (xvii, 300 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Role of security mechanisms in the building blocks of the cloud infrastructure -- Chapter 2. Energy optimization in cryptographic protocols for the cloud -- Chapter 3. A recent study on high dimensional features used in stego image anomaly detection -- Chapter 4. High efficient data embedding in image steganography using parallel programming -- Chapter 5. Analysis of mobile cloud computing: architecture, applications, challenges, and future perspectives -- Chapter 6. Mobile cloud computing: applications perspective -- Chapter 7. Processing IoT data: from cloud to fogit's time to be down to earth -- Chapter 8. Data classification and prediction -- Chapter 9. Ontology based feature extraction from text documents -- Chapter 10. Location-based advertising using location-aware data mining -- Chapter 11. Amelioration of big data analytics by employing big data tools and techniques -- Chapter 12. Recent development in big data analytics: research perspective. Restricted to subscribers or individual electronic text purchasers. "This book explores the applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management. It provides information on the topics of Big Data, Internet of Things, Mobile Technologies, Cloud Computing and Information Security"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/30/2018). Computer networks. Information technology. Karthikeyan, P. 1981- editor. Thangavel, M. 1989- editor. IGI Global, publisher. (Original) (DLC)2017027302 Print version: 152254044X 9781522540441 (DLC) 2017027302 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4044-1 Volltext |
spellingShingle | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management Chapter 1. Role of security mechanisms in the building blocks of the cloud infrastructure -- Chapter 2. Energy optimization in cryptographic protocols for the cloud -- Chapter 3. A recent study on high dimensional features used in stego image anomaly detection -- Chapter 4. High efficient data embedding in image steganography using parallel programming -- Chapter 5. Analysis of mobile cloud computing: architecture, applications, challenges, and future perspectives -- Chapter 6. Mobile cloud computing: applications perspective -- Chapter 7. Processing IoT data: from cloud to fogit's time to be down to earth -- Chapter 8. Data classification and prediction -- Chapter 9. Ontology based feature extraction from text documents -- Chapter 10. Location-based advertising using location-aware data mining -- Chapter 11. Amelioration of big data analytics by employing big data tools and techniques -- Chapter 12. Recent development in big data analytics: research perspective. Computer networks. Information technology. |
title | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management |
title_auth | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management |
title_exact_search | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management |
title_full | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management P. Karthikeyan and M. Thangavel, editors. |
title_fullStr | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management P. Karthikeyan and M. Thangavel, editors. |
title_full_unstemmed | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management P. Karthikeyan and M. Thangavel, editors. |
title_short | Applications of security, mobile, analytic and cloud (SMAC) technologies for effective information processing and management |
title_sort | applications of security mobile analytic and cloud smac technologies for effective information processing and management |
topic | Computer networks. Information technology. |
topic_facet | Computer networks. Information technology. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4044-1 |
work_keys_str_mv | AT karthikeyanp applicationsofsecuritymobileanalyticandcloudsmactechnologiesforeffectiveinformationprocessingandmanagement AT thangavelm applicationsofsecuritymobileanalyticandcloudsmactechnologiesforeffectiveinformationprocessingandmanagement AT igiglobal applicationsofsecuritymobileanalyticandcloudsmactechnologiesforeffectiveinformationprocessingandmanagement |