Secure edge computing: applications, techniques and challenges
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
CRC Press
2021
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000427325/?ar |
Zusammenfassung: | The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area. |
Umfang: | 1 Online-Ressource |
ISBN: | 9781000427325 1000427323 9781000427318 1000427315 9781003028635 1003028632 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-068277202 | ||
003 | DE-627-1 | ||
005 | 20240228121405.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210914s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781000427325 |c electronic bk. |9 978-1-000-42732-5 | ||
020 | |a 1000427323 |c electronic bk. |9 1-000-42732-3 | ||
020 | |a 9781000427318 |c electronic bk. |9 978-1-000-42731-8 | ||
020 | |a 1000427315 |c electronic bk. |9 1-000-42731-5 | ||
020 | |a 9781003028635 |c ebook |9 978-1-003-02863-5 | ||
020 | |a 1003028632 |9 1-003-02863-2 | ||
035 | |a (DE-627-1)068277202 | ||
035 | |a (DE-599)KEP068277202 | ||
035 | |a (ORHE)9781000427325 | ||
035 | |a (DE-627-1)068277202 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UTR |2 bicssc | |
082 | 0 | |a 005.758 |2 23 | |
245 | 1 | 0 | |a Secure edge computing |b applications, techniques and challenges |
264 | 1 | |a [Place of publication not identified] |b CRC Press |c 2021 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area. | ||
650 | 0 | |a Edge computing | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Edge computing | |
700 | 1 | |a Ahmed, Mohiuddin |e HerausgeberIn |4 edt | |
700 | 1 | |a Dowland, Paul |e HerausgeberIn |4 edt | |
776 | 1 | |z 0367464144 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0367464144 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000427325/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-068277202 |
---|---|
_version_ | 1821494830848540672 |
adam_text | |
any_adam_object | |
author2 | Ahmed, Mohiuddin Dowland, Paul |
author2_role | edt edt |
author2_variant | m a ma p d pd |
author_facet | Ahmed, Mohiuddin Dowland, Paul |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)068277202 (DE-599)KEP068277202 (ORHE)9781000427325 |
dewey-full | 005.758 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.758 |
dewey-search | 005.758 |
dewey-sort | 15.758 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03703cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-068277202</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121405.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210914s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000427325</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-42732-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000427323</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-42732-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000427318</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-42731-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000427315</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-42731-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003028635</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-003-02863-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003028632</subfield><subfield code="9">1-003-02863-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068277202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP068277202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000427325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068277202</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.758</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure edge computing</subfield><subfield code="b">applications, techniques and challenges</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Edge computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Edge computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmed, Mohiuddin</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dowland, Paul</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0367464144</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0367464144</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000427325/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-068277202 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:37Z |
institution | BVB |
isbn | 9781000427325 1000427323 9781000427318 1000427315 9781003028635 1003028632 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Secure edge computing applications, techniques and challenges [Place of publication not identified] CRC Press 2021 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area. Edge computing Computer security Computer Security Sécurité informatique COMPUTERS ; Networking ; Security COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; General Ahmed, Mohiuddin HerausgeberIn edt Dowland, Paul HerausgeberIn edt 0367464144 Erscheint auch als Druck-Ausgabe 0367464144 |
spellingShingle | Secure edge computing applications, techniques and challenges Edge computing Computer security Computer Security Sécurité informatique COMPUTERS ; Networking ; Security COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; General |
title | Secure edge computing applications, techniques and challenges |
title_auth | Secure edge computing applications, techniques and challenges |
title_exact_search | Secure edge computing applications, techniques and challenges |
title_full | Secure edge computing applications, techniques and challenges |
title_fullStr | Secure edge computing applications, techniques and challenges |
title_full_unstemmed | Secure edge computing applications, techniques and challenges |
title_short | Secure edge computing |
title_sort | secure edge computing applications techniques and challenges |
title_sub | applications, techniques and challenges |
topic | Edge computing Computer security Computer Security Sécurité informatique COMPUTERS ; Networking ; Security COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; General |
topic_facet | Edge computing Computer security Computer Security Sécurité informatique COMPUTERS ; Networking ; Security COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; General |
work_keys_str_mv | AT ahmedmohiuddin secureedgecomputingapplicationstechniquesandchallenges AT dowlandpaul secureedgecomputingapplicationstechniquesandchallenges |