Personnaliser

OK

Security Designs for the Cloud, Iot, and Social Networking -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

254,01 €

Produit Neuf

  • Ou 63,50 € /mois

    • Livraison à 0,01 €
    • Livré entre le 18 et le 30 mai
    Voir les modes de livraison

    rarewaves-uk

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Security Designs For The Cloud, Iot, And Social Networking de Format Relié  - Livre

        Note : 0 0 avis sur Security Designs For The Cloud, Iot, And Social Networking de Format Relié  - Livre

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Security Designs For The Cloud, Iot, And Social Networking de Format Relié

         - Livre

        Livre - 01/11/2019 - Relié - Langue : Anglais

        . .

      • Editeur : Wiley
      • Langue : Anglais
      • Parution : 01/11/2019
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 300
      • Expédition : 758
      • Dimensions : 26.0 x 18.3 x 2.1
      • ISBN : 9781119592266



      • Résumé :

        List of Figures xv
        List of Tables xix
        Foreword xxi
        Preface xxiii
        Acknowledgments xxv
        Acronyms xxvii

        Part I Security Designs for the Cloud Network

        1 Encryption Algorithm for Data Security in Cloud Computing 3
        Anindita Desarkar, Ajanta Das

        1.1 Introduction 4
        1.2 Related Work 4
        1.3 Cloud Computing - A Brief Overview 5
        1.4 Data Security in Cloud Storage 7
        1.5 Comparison of Encryption Algorithms 16
        1.6 Performance Analysis of Encryption Algorithms in Cloud 16
        1.7 Conclusion 17

        2 Analysis of Security Issues in Cloud Environment 19
        Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty

        2.1 An Insight into Cloud Computing 20
        2.2 Critical Challenges Concerning Cloud Computing 21
        2.3 Basic Models Governing Cloud Computing 22
        2.4 Security Countermeasures in Cloud Computing 26
        2.5 Discussion of an Implemented SDN Security Framework 29
        2.6 Result Analysis 35
        2.7 Conclusion 40

        3 Security and Challenges in Mobile Cloud Computing 43
        Ankur Dumka, Minakshi Memoria, Alaknanda Ashok

        3.1 Introduction 44
        3.2 Literature Review 46
        3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46
        3.4 Proposed Preventive Measure for Security in MCC 54
        3.5 Conclusion 55

        4 Fog Computing and Its Security Issues 59
        Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le

        4.1 Introduction 60
        4.2 Current Fog Applications 62
        4.3 Security and Privacy in Fog Computing 66
        4.4 Secure and Private Data Computation 69
        4.5 Conclusion 71

        5 Application Safety and Service Vulnerability in Cloud Network 77
        Sudipta Sahana, Debabrata Sarddar

        5.1 Introduction 78
        5.2 Security Concerns of Cloud Computing 80
        5.3 Security Tools in Cloud 84
        5.4 Cloud Service Vulnerabilities 89
        5.5 Cloud Computing Security Best Practices 92
        5.6 Conclusion 94

        Part II Security Designs for the Internet of Things and Social Networks

        6 IoT Security and Privacy Preservation 99
        Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani

        6.1 Introduction 100
        6.2 Review of Existing Technology 101
        6.3 Research Design 101
        6.4 Methodology 103
        6.5 Implication and Findings 106
        6.6 Future Scope 108
        6.7 Conclusion 108

        7 Automation Movie Recommender System Based on Internet of Things and Clustering 113
        Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma

        7.1 Introduction 114
        7.2 Background 115
        7.3 Related Works 122
        7.4 Proposed System 123
        7.5 Implementation 124
        7.6 Conclusion 127

        8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129
        Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi

        8.1 Introduction to Data Analytics 130
        8.2 Privacy Concerns Related to Use of Data Analytics 133
        8.3 Issues 137
        8.4 Social Media 138
        8.5 Conclusion 139

        9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143
        Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le

        9.1 Introduction 144
        9.2 Related Work 144
        9.3 RESTful Web Server 144
        9.4 Why and How REST is More Suitable for IoT 145
        9.5 Architecture of Arduino-Based Home Automation System 146
        9.6 Implementation Details 146
        9.7 Why Arduino? 147
        9.8 Result Analysis 147
        9.9 Conclusion and Future Scope 150

        10 The Vital Role of Fog Computing in Internet of Things 153
        Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le<...

        Biographie:
        Part 2 focuses on Security Designs for the Internet of Things and Social Networks...

        Sommaire:

        The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking.

        Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media.

        The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com