Показать сокращенную информацию
dc.contributor.author | Banerjee Indradip | |
dc.contributor.author | Bhattacharyya Siddhartha | |
dc.contributor.author | Gupta Shibakali | |
dc.date.accessioned | 2024-01-29T21:50:09Z | |
dc.date.available | 2024-01-29T21:50:09Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Big data security De Gruyter frontiers in computational intelligence ;, v. 3. - 1 online resource (ix, 144 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/2330583.pdf | |
dc.identifier.isbn | 9783110606058 | |
dc.identifier.isbn | 3110606054 | |
dc.identifier.isbn | 9783110605969 | |
dc.identifier.isbn | 3110605961 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/179972 | |
dc.description | EbpS Open Access | |
dc.description | In English. | |
dc.description | Includes bibliographical references | |
dc.description.abstract | After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology | |
dc.description.tableofcontents | Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha -- Mrsic, Leo / Fijacko, Goran / Balkovic, Mislav -- Chowdhury, Souvik / Gupta, Shibakali -- Gupta, Shibakali / Mukherjee, Ayan -- Mukherjee, Srilekha / Sanyal, Goutam -- Koley, Santanu -- Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha 1. Introduction / 2. Digital identity protection using blockchain for academic qualification certificates / 3. Anomaly detection in cloud big database metric / 4. Use of big data in hacking and social engineering / 5. Steganography, the widely used name for data hiding / 6. Big data security issues with challenges and solutions / 7. Conclusions / | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | De Gruyter Frontiers in Computational Intelligence. volume 3 | |
dc.relation.ispartofseries | De Gruyter frontiers in computational intelligence ;. v. 3. | |
dc.subject.other | Big data -- Security measures. | |
dc.subject.other | COMPUTERS -- Database Management -- Data Mining. | |
dc.subject.other | Electronic books. | |
dc.subject.other | Electronic books. | |
dc.title | Big data security De Gruyter frontiers in computational intelligence ;, v. 3./ edited by Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya | |
dc.type | Book | |
dc.description.pages | 1 online resource (ix, 144 pages) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C473 |