Security and Privacy for Big Data, Cloud Computing and Applications: Computing and Networks
Editat de Wei Ren, Lizhe Wang, Kim-Kwang Raymond Chooen Limba Engleză Hardback – 9 oct 2019
Din seria Computing and Networks
- 20%
Preț: 673.35 lei - 18%
Preț: 746.03 lei - 15%
Preț: 555.80 lei - 15%
Preț: 541.41 lei - 20%
Preț: 681.27 lei - 20%
Preț: 772.20 lei - 20%
Preț: 775.00 lei - 20%
Preț: 882.18 lei - 20%
Preț: 830.37 lei - 20%
Preț: 913.46 lei - 20%
Preț: 968.87 lei - 20%
Preț: 859.86 lei - 20%
Preț: 753.59 lei - 20%
Preț: 779.48 lei - 20%
Preț: 1002.61 lei - 20%
Preț: 748.92 lei - 20%
Preț: 779.48 lei - 20%
Preț: 785.77 lei - 15%
Preț: 456.55 lei - 18%
Preț: 724.81 lei - 20%
Preț: 883.97 lei - 18%
Preț: 751.35 lei - 20%
Preț: 775.00 lei - 20%
Preț: 780.39 lei - 20%
Preț: 832.14 lei - 20%
Preț: 831.29 lei
Preț: 800.89 lei
Preț vechi: 1001.11 lei
-20% Nou
Puncte Express: 1201
Preț estimativ în valută:
141.70€ • 166.59$ • 124.11£
141.70€ • 166.59$ • 124.11£
Carte disponibilă
Livrare economică 08-22 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781785617478
ISBN-10: 1785617478
Pagini: 328
Dimensiuni: 160 x 239 x 23 mm
Greutate: 0.64 kg
Editura: Institution of Engineering and Technology
Colecția Computing and Networks
Seria Computing and Networks
ISBN-10: 1785617478
Pagini: 328
Dimensiuni: 160 x 239 x 23 mm
Greutate: 0.64 kg
Editura: Institution of Engineering and Technology
Colecția Computing and Networks
Seria Computing and Networks
Cuprins
- Chapter 1: Privacy preserving in big data
- Chapter 2: Privacy-preserving analysis for big data using cryptographic tools
- Chapter 3: Big data security in Internet of Things
- Chapter 4: A watermark-based in situ access-control model for image big data
- Chapter 5: Blockchain-based security and access control for BIM big data
- Chapter 6: Security of marine-information system
- Chapter 7: A layered security architecture based on cyber kill chain against advanced persistent threats
- Chapter 8: Privacy-aware digital forensics
- Chapter 9: A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges
- Chapter 10: Software-defined mobile networks security
- Chapter 11: Dynamic public opinion evolvement modeling and supervision in social networks
- Chapter 12: Privacy verification of PhotoDNA based on machine learning
- Chapter 13: Chaos-based communication systems