Security, privacy, and forensics issues in big data:
"This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- |
Beschreibung: | 26 PDFs (456 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522597445 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00223456 | ||
003 | IGIG | ||
005 | 20190812164905.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190813s2019 pau fob 001 0 eng d | ||
010 | |z 2019007879 | ||
020 | |a 9781522597445 |q ebook | ||
020 | |z 9781522597421 |q hardcover | ||
020 | |z 9781522597438 |q softcover | ||
024 | 7 | |a 10.4018/978-1-5225-9742-1 |2 doi | |
035 | |a (CaBNVSL)slc20855504 | ||
035 | |a (OCoLC)1112162229 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.B45 |b S43 2020e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Security, privacy, and forensics issues in big data |c Ramesh C. Joshi and Brij B. Gupta, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 26 PDFs (456 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 08/13/2019). | ||
650 | 0 | |a Big data. | |
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Digital forensic science. | |
650 | 0 | |a Privacy, Right of. | |
700 | 1 | |a Gupta, Brij |d 1982- |e editor. | |
700 | 1 | |a Joshi, R. C., |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019007879 | |
776 | 0 | 8 | |i Print version: |z 1522597425 |z 9781522597421 |w (DLC) 2019007879 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9742-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00223456 |
---|---|
_version_ | 1804751459115335680 |
adam_text | |
any_adam_object | |
author2 | Gupta, Brij 1982- Joshi, R. C. |
author2_role | edt edt |
author2_variant | b g bg r c j rc rcj |
author_facet | Gupta, Brij 1982- Joshi, R. C. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.B45 S43 2020e |
callnumber-search | QA76.9.B45 S43 2020e |
callnumber-sort | QA 276.9 B45 S43 42020E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution. |
ctrlnum | (CaBNVSL)slc20855504 (OCoLC)1112162229 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03567nam a2200493 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00223456</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190812164905.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190813s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019007879</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522597445</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522597421</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522597438</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-9742-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20855504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1112162229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.B45</subfield><subfield code="b">S43 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security, privacy, and forensics issues in big data </subfield><subfield code="c">Ramesh C. Joshi and Brij B. Gupta, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">26 PDFs (456 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 08/13/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Brij</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joshi, R. C.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019007879</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522597425</subfield><subfield code="z">9781522597421</subfield><subfield code="w">(DLC) 2019007879</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9742-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00223456 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:53Z |
institution | BVB |
isbn | 9781522597445 |
language | English |
oclc_num | 1112162229 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 26 PDFs (456 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Security, privacy, and forensics issues in big data Ramesh C. Joshi and Brij B. Gupta, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 26 PDFs (456 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution. Restricted to subscribers or individual electronic text purchasers. "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 08/13/2019). Big data. Cyber intelligence (Computer security) Digital forensic science. Privacy, Right of. Gupta, Brij 1982- editor. Joshi, R. C., editor. IGI Global, publisher. (Original) (DLC)2019007879 Print version: 1522597425 9781522597421 (DLC) 2019007879 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9742-1 Volltext |
spellingShingle | Security, privacy, and forensics issues in big data Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution. Big data. Cyber intelligence (Computer security) Digital forensic science. Privacy, Right of. |
title | Security, privacy, and forensics issues in big data |
title_auth | Security, privacy, and forensics issues in big data |
title_exact_search | Security, privacy, and forensics issues in big data |
title_full | Security, privacy, and forensics issues in big data Ramesh C. Joshi and Brij B. Gupta, editors. |
title_fullStr | Security, privacy, and forensics issues in big data Ramesh C. Joshi and Brij B. Gupta, editors. |
title_full_unstemmed | Security, privacy, and forensics issues in big data Ramesh C. Joshi and Brij B. Gupta, editors. |
title_short | Security, privacy, and forensics issues in big data |
title_sort | security privacy and forensics issues in big data |
topic | Big data. Cyber intelligence (Computer security) Digital forensic science. Privacy, Right of. |
topic_facet | Big data. Cyber intelligence (Computer security) Digital forensic science. Privacy, Right of. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-9742-1 |
work_keys_str_mv | AT guptabrij securityprivacyandforensicsissuesinbigdata AT joshirc securityprivacyandforensicsissuesinbigdata AT igiglobal securityprivacyandforensicsissuesinbigdata |