Combating Security Challenges in the Age of Big Data Combating Security Challenges in the Age of Big Data
Advanced Sciences and Technologies for Security Applications

Combating Security Challenges in the Age of Big Data

Powered by State-of-the-Art Artificial Intelligence Techniques

    • ‏149٫99 US$
    • ‏149٫99 US$

وصف الناشر

This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars. 

The book explains how the security needs and implementations are inherently different at different stages of the big data centric system,namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state of the art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era. 

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٠
٢٦ مايو
اللغة
EN
الإنجليزية
عدد الصفحات
٢٨٢
الناشر
Springer International Publishing
البائع
Springer Nature B.V.
الحجم
٣٠٫٤
‫م.ب.‬
Security, Privacy and Trust in the IoT Environment Security, Privacy and Trust in the IoT Environment
٢٠١٩
Security, Privacy and Data Analytics Security, Privacy and Data Analytics
٢٠٢٢
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
٢٠١٩
Cybersecurity and High-Performance Computing Environments Cybersecurity and High-Performance Computing Environments
٢٠٢٢
Handbook on Securing Cyber-Physical Critical Infrastructure Handbook on Securing Cyber-Physical Critical Infrastructure
٢٠١٢
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
٢٠١٩
Cognitive Radio Oriented Wireless Networks and Wireless Internet Cognitive Radio Oriented Wireless Networks and Wireless Internet
٢٠٢٢
Smart Grid and Internet of Things Smart Grid and Internet of Things
٢٠١٨
Evolution of Smart Grids Evolution of Smart Grids
٢٠١٥
Counter-Terrorism, Ethics and Technology Counter-Terrorism, Ethics and Technology
٢٠٢١
Open Source Intelligence Investigation Open Source Intelligence Investigation
٢٠١٧
Cyber Weaponry Cyber Weaponry
٢٠١٨
Digital Transformation in Policing: The Promise, Perils and Solutions Digital Transformation in Policing: The Promise, Perils and Solutions
٢٠٢٣
Cyber Criminology Cyber Criminology
٢٠١٨
Security by Design Security by Design
٢٠١٨