Card | Table | RUSMARC | |
De Gruyter frontiers in computational intelligence ;.
|
Annotation
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All |
![]() ![]() ![]() |
||||
Internet | Readers |
![]() ![]() |
||||
![]() |
Internet | Anonymous |
Table of Contents
- Preface
- Contents
- List of Contributors
- 1. Introduction
- 2. Digital identity protection using blockchain for academic qualification certificates
- 3. Anomaly detection in cloud big database metric
- 4. Use of big data in hacking and social engineering
- 5. Steganography, the widely used name for data hiding
- 6. Big data security issues with challenges and solutions
- 7. Conclusions
Usage statistics
|
Access count: 0
Last 30 days: 0 Detailed usage statistics |