Security Designs for the Cloud, Iot, and Social Networking -
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre254,01 €
Produit Neuf
Ou 63,50 € /mois
- Livraison à 0,01 €
- Livré entre le 18 et le 30 mai
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Security Designs For The Cloud, Iot, And Social Networking de Format Relié - Livre
0 avis sur Security Designs For The Cloud, Iot, And Social Networking de Format Relié - Livre
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Security Designs For The Cloud, Iot, And Social Networking de Format Relié
- Livre
Résumé : List of Figures xv Part I Security Designs for the Cloud Network 1 Encryption Algorithm for Data Security in Cloud Computing 3 1.1 Introduction 4 2 Analysis of Security Issues in Cloud Environment 19 2.1 An Insight into Cloud Computing 20 3 Security and Challenges in Mobile Cloud Computing 43 3.1 Introduction 44 4 Fog Computing and Its Security Issues 59 4.1 Introduction 60 5 Application Safety and Service Vulnerability in Cloud Network 77 5.1 Introduction 78 Part II Security Designs for the Internet of Things and Social Networks 6 IoT Security and Privacy Preservation 99 6.1 Introduction 100 7 Automation Movie Recommender System Based on Internet of Things and Clustering 113 7.1 Introduction 114 8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129 8.1 Introduction to Data Analytics 130 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143 9.1 Introduction 144 10 The Vital Role of Fog Computing in Internet of Things 153
List of Tables xix
Foreword xxi
Preface xxiii
Acknowledgments xxv
Acronyms xxvii
Anindita Desarkar, Ajanta Das
1.2 Related Work 4
1.3 Cloud Computing - A Brief Overview 5
1.4 Data Security in Cloud Storage 7
1.5 Comparison of Encryption Algorithms 16
1.6 Performance Analysis of Encryption Algorithms in Cloud 16
1.7 Conclusion 17
Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty
2.2 Critical Challenges Concerning Cloud Computing 21
2.3 Basic Models Governing Cloud Computing 22
2.4 Security Countermeasures in Cloud Computing 26
2.5 Discussion of an Implemented SDN Security Framework 29
2.6 Result Analysis 35
2.7 Conclusion 40
Ankur Dumka, Minakshi Memoria, Alaknanda Ashok
3.2 Literature Review 46
3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46
3.4 Proposed Preventive Measure for Security in MCC 54
3.5 Conclusion 55
Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le
4.2 Current Fog Applications 62
4.3 Security and Privacy in Fog Computing 66
4.4 Secure and Private Data Computation 69
4.5 Conclusion 71
Sudipta Sahana, Debabrata Sarddar
5.2 Security Concerns of Cloud Computing 80
5.3 Security Tools in Cloud 84
5.4 Cloud Service Vulnerabilities 89
5.5 Cloud Computing Security Best Practices 92
5.6 Conclusion 94
Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani
6.2 Review of Existing Technology 101
6.3 Research Design 101
6.4 Methodology 103
6.5 Implication and Findings 106
6.6 Future Scope 108
6.7 Conclusion 108
Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma
7.2 Background 115
7.3 Related Works 122
7.4 Proposed System 123
7.5 Implementation 124
7.6 Conclusion 127
Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi
8.2 Privacy Concerns Related to Use of Data Analytics 133
8.3 Issues 137
8.4 Social Media 138
8.5 Conclusion 139
Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le
9.2 Related Work 144
9.3 RESTful Web Server 144
9.4 Why and How REST is More Suitable for IoT 145
9.5 Architecture of Arduino-Based Home Automation System 146
9.6 Implementation Details 146
9.7 Why Arduino? 147
9.8 Result Analysis 147
9.9 Conclusion and Future Scope 150
Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le<...
Biographie:
Part 2 focuses on Security Designs for the Internet of Things and Social Networks...
Sommaire: The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media. The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network...
Détails de conformité du produit
Personne responsable dans l'UE