Показать сокращенную информацию
dc.contributor.author | Joshi R. C., | |
dc.contributor.author | Gupta Brij | |
dc.date.accessioned | 2024-01-29T22:13:21Z | |
dc.date.available | 2024-01-29T22:13:21Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Security, privacy, and forensics issues in big data Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource. - URL: https://libweb.kpfu.ru/ebsco/pdf/2227888.pdf | |
dc.identifier.isbn | 1522597441 | |
dc.identifier.isbn | 9781522597445 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180414 | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"-- | |
dc.description.tableofcontents | Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution. | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | Advances in Information Security, Privacy, and Ethics (AISPE) Book Series | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series. | |
dc.subject.other | Big data. | |
dc.subject.other | Cyber intelligence (Computer security) | |
dc.subject.other | Privacy, Right of. | |
dc.subject.other | Digital forensic science. | |
dc.subject.other | Big data. | |
dc.subject.other | Cyber intelligence (Computer security) | |
dc.subject.other | Digital forensic science. | |
dc.subject.other | Privacy, Right of. | |
dc.subject.other | Electronic books. | |
dc.title | Security, privacy, and forensics issues in big data Advances in information security, privacy, and ethics (AISPE) book series./ [edited by] Ramesh C. Joshi, Brij B. Gupta. | |
dc.type | Book | |
dc.contributor.org | IGI Global, | |
dc.description.pages | 1 online resource. | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1455 |