Handbook of research on cloud computing and big data applications in IoT:
"This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud comput...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. It also explores big data applications in IoT"-- |
Beschreibung: | 34 PDFs (xxviii, 609 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522584087 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00217685 | ||
003 | IGIG | ||
005 | 20190325180310.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190326s2019 pau fob 000 0 eng d | ||
010 | |z 2018053032 | ||
020 | |a 9781522584087 |q ebook | ||
020 | |z 9781522584070 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-8407-0 |2 doi | |
035 | |a (CaBNVSL)slc20732020 | ||
035 | |a (OCoLC)1090540741 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.585 |b .H3628 2019e | |
082 | 7 | |a 004.67/82 |2 23 | |
245 | 0 | 0 | |a Handbook of research on cloud computing and big data applications in IoT |c B.B. Gupta and Dharma P. Agrawal, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 34 PDFs (xxviii, 609 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Resource management and scheduling for big data applications in cloud computing environments -- Chapter 2. On the use of system-level benchmarks for comparing public cloud environments -- Chapter 3. Adversarial attacks and defense on deep learning models for big data and IoT -- Chapter 4. Big data analytics: applications, trends, tools, and future research directions -- Chapter 5. Tier application in multi-cloud databases to improve security and service availability -- Chapter 6. Achieving secure and privacy-preserving in mobile social networks -- Chapter 7. Adversarial attacks and defenses in malware detection classifiers -- Chapter 8. A privacy-preserving feature extraction method for big data analytics based on data-independent reusable projection -- Chapter 9. An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software: user defined schedulers in Aneka Paas cloud software -- Chapter 10. A cloud-based patient health monitoring system using the Internet of things -- Chapter 11. Statistical modelling and analysis of the computer-simulated datasets -- Chapter 12. Evaluation of reliable data storage in cloud using an efficient encryption technique -- Chapter 13. Enabling technologies for IoT: issues, challenges, and opportunities -- Chapter 14. A system for natural language interaction with the heterogeneous information network -- Chapter 15. Fog computing: concepts, applications, and countermeasures against security attacks -- Chapter 16. Survey on industrial Internet of things (IoT) threats and security -- Chapter 17. Chaos theory and systems in cloud content security -- Chapter 18. A study on recent trends in cloud-based data processing for IoT era -- Chapter 19. A perspective on using blockchain for ensuring security in smart card systems -- Chapter 20. Delay tolerant networks: architecture, routing, congestion, and security issues -- Chapter 21. The impact of Internet of things self-security on daily business and business continuity -- Chapter 22. Survey on various mapreduce scheduling algorithms -- Chapter 23. Software-defined networks (SDN): a Survey. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. It also explores big data applications in IoT"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/26/2019). | ||
650 | 0 | |a Big data. | |
650 | 0 | |a Cloud computing. | |
650 | 0 | |a Internet of things. | |
700 | 1 | |a Agrawal, Dharma P. |q (Dharma Prakash) |d 1945- |e editor. | |
700 | 1 | |a Gupta, B. B. |d 1982- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018053032 | |
776 | 0 | 8 | |i Print version: |z 1522584072 |z 9781522584070 |w (DLC) 2018053032 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8407-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00217685 |
---|---|
_version_ | 1804751458500870144 |
adam_text | |
any_adam_object | |
author2 | Agrawal, Dharma P. (Dharma Prakash) 1945- Gupta, B. B. 1982- |
author2_role | edt edt |
author2_variant | d p a dp dpa b b g bb bbg |
author_facet | Agrawal, Dharma P. (Dharma Prakash) 1945- Gupta, B. B. 1982- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .H3628 2019e |
callnumber-search | QA76.585 .H3628 2019e |
callnumber-sort | QA 276.585 H3628 42019E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Resource management and scheduling for big data applications in cloud computing environments -- Chapter 2. On the use of system-level benchmarks for comparing public cloud environments -- Chapter 3. Adversarial attacks and defense on deep learning models for big data and IoT -- Chapter 4. Big data analytics: applications, trends, tools, and future research directions -- Chapter 5. Tier application in multi-cloud databases to improve security and service availability -- Chapter 6. Achieving secure and privacy-preserving in mobile social networks -- Chapter 7. Adversarial attacks and defenses in malware detection classifiers -- Chapter 8. A privacy-preserving feature extraction method for big data analytics based on data-independent reusable projection -- Chapter 9. An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software: user defined schedulers in Aneka Paas cloud software -- Chapter 10. A cloud-based patient health monitoring system using the Internet of things -- Chapter 11. Statistical modelling and analysis of the computer-simulated datasets -- Chapter 12. Evaluation of reliable data storage in cloud using an efficient encryption technique -- Chapter 13. Enabling technologies for IoT: issues, challenges, and opportunities -- Chapter 14. A system for natural language interaction with the heterogeneous information network -- Chapter 15. Fog computing: concepts, applications, and countermeasures against security attacks -- Chapter 16. Survey on industrial Internet of things (IoT) threats and security -- Chapter 17. Chaos theory and systems in cloud content security -- Chapter 18. A study on recent trends in cloud-based data processing for IoT era -- Chapter 19. A perspective on using blockchain for ensuring security in smart card systems -- Chapter 20. Delay tolerant networks: architecture, routing, congestion, and security issues -- Chapter 21. The impact of Internet of things self-security on daily business and business continuity -- Chapter 22. Survey on various mapreduce scheduling algorithms -- Chapter 23. Software-defined networks (SDN): a Survey. |
ctrlnum | (CaBNVSL)slc20732020 (OCoLC)1090540741 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04295nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00217685</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190325180310.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190326s2019 pau fob 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018053032</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522584087</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522584070</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8407-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20732020</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1090540741</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.H3628 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on cloud computing and big data applications in IoT </subfield><subfield code="c">B.B. Gupta and Dharma P. Agrawal, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">34 PDFs (xxviii, 609 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Resource management and scheduling for big data applications in cloud computing environments -- Chapter 2. On the use of system-level benchmarks for comparing public cloud environments -- Chapter 3. Adversarial attacks and defense on deep learning models for big data and IoT -- Chapter 4. Big data analytics: applications, trends, tools, and future research directions -- Chapter 5. Tier application in multi-cloud databases to improve security and service availability -- Chapter 6. Achieving secure and privacy-preserving in mobile social networks -- Chapter 7. Adversarial attacks and defenses in malware detection classifiers -- Chapter 8. A privacy-preserving feature extraction method for big data analytics based on data-independent reusable projection -- Chapter 9. An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software: user defined schedulers in Aneka Paas cloud software -- Chapter 10. A cloud-based patient health monitoring system using the Internet of things -- Chapter 11. Statistical modelling and analysis of the computer-simulated datasets -- Chapter 12. Evaluation of reliable data storage in cloud using an efficient encryption technique -- Chapter 13. Enabling technologies for IoT: issues, challenges, and opportunities -- Chapter 14. A system for natural language interaction with the heterogeneous information network -- Chapter 15. Fog computing: concepts, applications, and countermeasures against security attacks -- Chapter 16. Survey on industrial Internet of things (IoT) threats and security -- Chapter 17. Chaos theory and systems in cloud content security -- Chapter 18. A study on recent trends in cloud-based data processing for IoT era -- Chapter 19. A perspective on using blockchain for ensuring security in smart card systems -- Chapter 20. Delay tolerant networks: architecture, routing, congestion, and security issues -- Chapter 21. The impact of Internet of things self-security on daily business and business continuity -- Chapter 22. Survey on various mapreduce scheduling algorithms -- Chapter 23. Software-defined networks (SDN): a Survey.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. It also explores big data applications in IoT"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/26/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agrawal, Dharma P.</subfield><subfield code="q">(Dharma Prakash)</subfield><subfield code="d">1945-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, B. B.</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018053032</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522584072</subfield><subfield code="z">9781522584070</subfield><subfield code="w">(DLC) 2018053032</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8407-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00217685 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:53Z |
institution | BVB |
isbn | 9781522584087 |
language | English |
oclc_num | 1090540741 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 34 PDFs (xxviii, 609 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on cloud computing and big data applications in IoT B.B. Gupta and Dharma P. Agrawal, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 34 PDFs (xxviii, 609 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Resource management and scheduling for big data applications in cloud computing environments -- Chapter 2. On the use of system-level benchmarks for comparing public cloud environments -- Chapter 3. Adversarial attacks and defense on deep learning models for big data and IoT -- Chapter 4. Big data analytics: applications, trends, tools, and future research directions -- Chapter 5. Tier application in multi-cloud databases to improve security and service availability -- Chapter 6. Achieving secure and privacy-preserving in mobile social networks -- Chapter 7. Adversarial attacks and defenses in malware detection classifiers -- Chapter 8. A privacy-preserving feature extraction method for big data analytics based on data-independent reusable projection -- Chapter 9. An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software: user defined schedulers in Aneka Paas cloud software -- Chapter 10. A cloud-based patient health monitoring system using the Internet of things -- Chapter 11. Statistical modelling and analysis of the computer-simulated datasets -- Chapter 12. Evaluation of reliable data storage in cloud using an efficient encryption technique -- Chapter 13. Enabling technologies for IoT: issues, challenges, and opportunities -- Chapter 14. A system for natural language interaction with the heterogeneous information network -- Chapter 15. Fog computing: concepts, applications, and countermeasures against security attacks -- Chapter 16. Survey on industrial Internet of things (IoT) threats and security -- Chapter 17. Chaos theory and systems in cloud content security -- Chapter 18. A study on recent trends in cloud-based data processing for IoT era -- Chapter 19. A perspective on using blockchain for ensuring security in smart card systems -- Chapter 20. Delay tolerant networks: architecture, routing, congestion, and security issues -- Chapter 21. The impact of Internet of things self-security on daily business and business continuity -- Chapter 22. Survey on various mapreduce scheduling algorithms -- Chapter 23. Software-defined networks (SDN): a Survey. Restricted to subscribers or individual electronic text purchasers. "This book examines the latest research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. It also explores big data applications in IoT"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/26/2019). Big data. Cloud computing. Internet of things. Agrawal, Dharma P. (Dharma Prakash) 1945- editor. Gupta, B. B. 1982- editor. IGI Global, publisher. (Original) (DLC)2018053032 Print version: 1522584072 9781522584070 (DLC) 2018053032 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8407-0 Volltext |
spellingShingle | Handbook of research on cloud computing and big data applications in IoT Chapter 1. Resource management and scheduling for big data applications in cloud computing environments -- Chapter 2. On the use of system-level benchmarks for comparing public cloud environments -- Chapter 3. Adversarial attacks and defense on deep learning models for big data and IoT -- Chapter 4. Big data analytics: applications, trends, tools, and future research directions -- Chapter 5. Tier application in multi-cloud databases to improve security and service availability -- Chapter 6. Achieving secure and privacy-preserving in mobile social networks -- Chapter 7. Adversarial attacks and defenses in malware detection classifiers -- Chapter 8. A privacy-preserving feature extraction method for big data analytics based on data-independent reusable projection -- Chapter 9. An API for development of user-defined scheduling algorithms in Aneka PaaS cloud software: user defined schedulers in Aneka Paas cloud software -- Chapter 10. A cloud-based patient health monitoring system using the Internet of things -- Chapter 11. Statistical modelling and analysis of the computer-simulated datasets -- Chapter 12. Evaluation of reliable data storage in cloud using an efficient encryption technique -- Chapter 13. Enabling technologies for IoT: issues, challenges, and opportunities -- Chapter 14. A system for natural language interaction with the heterogeneous information network -- Chapter 15. Fog computing: concepts, applications, and countermeasures against security attacks -- Chapter 16. Survey on industrial Internet of things (IoT) threats and security -- Chapter 17. Chaos theory and systems in cloud content security -- Chapter 18. A study on recent trends in cloud-based data processing for IoT era -- Chapter 19. A perspective on using blockchain for ensuring security in smart card systems -- Chapter 20. Delay tolerant networks: architecture, routing, congestion, and security issues -- Chapter 21. The impact of Internet of things self-security on daily business and business continuity -- Chapter 22. Survey on various mapreduce scheduling algorithms -- Chapter 23. Software-defined networks (SDN): a Survey. Big data. Cloud computing. Internet of things. |
title | Handbook of research on cloud computing and big data applications in IoT |
title_auth | Handbook of research on cloud computing and big data applications in IoT |
title_exact_search | Handbook of research on cloud computing and big data applications in IoT |
title_full | Handbook of research on cloud computing and big data applications in IoT B.B. Gupta and Dharma P. Agrawal, editors. |
title_fullStr | Handbook of research on cloud computing and big data applications in IoT B.B. Gupta and Dharma P. Agrawal, editors. |
title_full_unstemmed | Handbook of research on cloud computing and big data applications in IoT B.B. Gupta and Dharma P. Agrawal, editors. |
title_short | Handbook of research on cloud computing and big data applications in IoT |
title_sort | handbook of research on cloud computing and big data applications in iot |
topic | Big data. Cloud computing. Internet of things. |
topic_facet | Big data. Cloud computing. Internet of things. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8407-0 |
work_keys_str_mv | AT agrawaldharmap handbookofresearchoncloudcomputingandbigdataapplicationsiniot AT guptabb handbookofresearchoncloudcomputingandbigdataapplicationsiniot AT igiglobal handbookofresearchoncloudcomputingandbigdataapplicationsiniot |