SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA:
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computa...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
CRC PRESS
2022
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000583700/?ar |
Zusammenfassung: | It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities. |
Umfang: | 1 Online-Ressource |
ISBN: | 9781000583700 1000583708 9781003107286 1003107281 9781000583632 1000583635 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-10256003X | ||
003 | DE-627-1 | ||
005 | 20240429114541.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781000583700 |c electronic bk. |9 978-1-000-58370-0 | ||
020 | |a 1000583708 |c electronic bk. |9 1-000-58370-8 | ||
020 | |a 9781003107286 |c electronic bk. |9 978-1-003-10728-6 | ||
020 | |a 1003107281 |c electronic bk. |9 1-003-10728-1 | ||
020 | |a 9781000583632 |c electronic bk. : PDF |9 978-1-000-58363-2 | ||
020 | |a 1000583635 |c electronic bk. : PDF |9 1-000-58363-5 | ||
035 | |a (DE-627-1)10256003X | ||
035 | |a (DE-599)KEP10256003X | ||
035 | |a (ORHE)9781000583700 | ||
035 | |a (DE-627-1)10256003X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UTR |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b CRC PRESS |c 2022 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities. | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Big data | |
650 | 0 | |a Computer security | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Données volumineuses | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Data Processing / General | |
650 | 4 | |a Big data | |
650 | 4 | |a Computer security | |
700 | 1 | |a Imran Tariq, Muhammad |e MitwirkendeR |4 ctb | |
700 | 1 | |a Balas, Valentina Emilia |e MitwirkendeR |4 ctb | |
700 | 1 | |a Tayyaba, Shahzadi |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0367619628 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0367619628 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000583700/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-10256003X |
---|---|
_version_ | 1821494933555511296 |
adam_text | |
any_adam_object | |
author2 | Imran Tariq, Muhammad Balas, Valentina Emilia Tayyaba, Shahzadi |
author2_role | ctb ctb ctb |
author2_variant | t m i tm tmi v e b ve veb s t st |
author_facet | Imran Tariq, Muhammad Balas, Valentina Emilia Tayyaba, Shahzadi |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)10256003X (DE-599)KEP10256003X (ORHE)9781000583700 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03051nam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-10256003X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114541.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000583700</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-58370-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000583708</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-000-58370-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003107286</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-10728-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003107281</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-10728-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000583632</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-000-58363-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000583635</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-000-58363-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10256003X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP10256003X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000583700</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10256003X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">CRC PRESS</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Données volumineuses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Data Processing / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big data</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Imran Tariq, Muhammad</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Balas, Valentina Emilia</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tayyaba, Shahzadi</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0367619628</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0367619628</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000583700/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-10256003X |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:15Z |
institution | BVB |
isbn | 9781000583700 1000583708 9781003107286 1003107281 9781000583632 1000583635 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC PRESS |
record_format | marc |
spelling | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA [Erscheinungsort nicht ermittelbar] CRC PRESS 2022 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities. Cloud computing Security measures Big data Computer security Infonuagique ; Sécurité ; Mesures Données volumineuses Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Data Processing / General Imran Tariq, Muhammad MitwirkendeR ctb Balas, Valentina Emilia MitwirkendeR ctb Tayyaba, Shahzadi MitwirkendeR ctb 0367619628 Erscheint auch als Druck-Ausgabe 0367619628 |
spellingShingle | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA Cloud computing Security measures Big data Computer security Infonuagique ; Sécurité ; Mesures Données volumineuses Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Data Processing / General |
title | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_auth | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_exact_search | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_full | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_fullStr | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_full_unstemmed | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_short | SECURITY AND PRIVACY TRENDS IN CLOUD COMPUTING AND BIG DATA |
title_sort | security and privacy trends in cloud computing and big data |
topic | Cloud computing Security measures Big data Computer security Infonuagique ; Sécurité ; Mesures Données volumineuses Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Data Processing / General |
topic_facet | Cloud computing Security measures Big data Computer security Infonuagique ; Sécurité ; Mesures Données volumineuses Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Data Processing / General |
work_keys_str_mv | AT imrantariqmuhammad securityandprivacytrendsincloudcomputingandbigdata AT balasvalentinaemilia securityandprivacytrendsincloudcomputingandbigdata AT tayyabashahzadi securityandprivacytrendsincloudcomputingandbigdata |