Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies
"Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data inte...
Gespeichert in:
Weitere beteiligte Personen: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
Scrivener Publishing/Wiley
2019
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119488057/?ar |
Zusammenfassung: | "Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"-- |
Beschreibung: | "John Wiley & Sons Inc."--title page verso. - Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119488323 111948832X 9781119488316 1119488311 9781119488330 1119488338 9781119488057 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108525872 | ||
003 | DE-627-1 | ||
005 | 20241001123224.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781119488323 |c Adobe PDF |9 978-1-119-48832-3 | ||
020 | |a 111948832X |9 1-119-48832-X | ||
020 | |a 9781119488316 |c ePub |9 978-1-119-48831-6 | ||
020 | |a 1119488311 |9 1-119-48831-1 | ||
020 | |a 9781119488330 |c electronic book |9 978-1-119-48833-0 | ||
020 | |a 1119488338 |c electronic book |9 1-119-48833-8 | ||
020 | |a 9781119488057 |9 978-1-119-48805-7 | ||
035 | |a (DE-627-1)108525872 | ||
035 | |a (DE-599)KEP108525872 | ||
035 | |a (ORHE)9781119488057 | ||
035 | |a (DE-627-1)108525872 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Cyber security in parallel and distributed computing |b concepts, techniques, applications and case studies |c edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee |
250 | |a First edition. | ||
264 | 1 | |a Hoboken, NJ |b Scrivener Publishing/Wiley |c 2019 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a "John Wiley & Sons Inc."--title page verso. - Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher | ||
520 | |a "Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"-- | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Parallel processing (Electronic computers) |v Security measures | |
650 | 0 | |a Electronic data processing |x Distributed processing |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Traitement réparti ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Parallel processing (Electronic computers) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic data processing ; Distributed processing ; Security measures | |
700 | 1 | |a Le, Dac-Nhuong |d 1983- |e HerausgeberIn |4 edt | |
700 | 1 | |a Kumar, Raghvendra |d 1987- |e HerausgeberIn |4 edt | |
700 | 1 | |a Mishra, Brojo Kishore |d 1979- |e HerausgeberIn |4 edt | |
700 | 1 | |a Khari, Manju |e HerausgeberIn |4 edt | |
700 | 1 | |a Chatterjee, Jyotir Moy |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781119488057 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119488057 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119488057/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108525872 |
---|---|
_version_ | 1821494927215820800 |
adam_text | |
any_adam_object | |
author2 | Le, Dac-Nhuong 1983- Kumar, Raghvendra 1987- Mishra, Brojo Kishore 1979- Khari, Manju Chatterjee, Jyotir Moy |
author2_role | edt edt edt edt edt |
author2_variant | d n l dnl r k rk b k m bk bkm m k mk j m c jm jmc |
author_facet | Le, Dac-Nhuong 1983- Kumar, Raghvendra 1987- Mishra, Brojo Kishore 1979- Khari, Manju Chatterjee, Jyotir Moy |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108525872 (DE-599)KEP108525872 (ORHE)9781119488057 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03207nam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-108525872</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123224.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119488323</subfield><subfield code="c">Adobe PDF</subfield><subfield code="9">978-1-119-48832-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111948832X</subfield><subfield code="9">1-119-48832-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119488316</subfield><subfield code="c">ePub</subfield><subfield code="9">978-1-119-48831-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119488311</subfield><subfield code="9">1-119-48831-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119488330</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-48833-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119488338</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-48833-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119488057</subfield><subfield code="9">978-1-119-48805-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108525872</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108525872</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119488057</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108525872</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security in parallel and distributed computing</subfield><subfield code="b">concepts, techniques, applications and case studies</subfield><subfield code="c">edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Scrivener Publishing/Wiley</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"John Wiley & Sons Inc."--title page verso. - Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Parallel processing (Electronic computers)</subfield><subfield code="v">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Traitement réparti ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Parallel processing (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing ; Distributed processing ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Le, Dac-Nhuong</subfield><subfield code="d">1983-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Raghvendra</subfield><subfield code="d">1987-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mishra, Brojo Kishore</subfield><subfield code="d">1979-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khari, Manju</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chatterjee, Jyotir Moy</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119488057</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119488057</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119488057/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108525872 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:09Z |
institution | BVB |
isbn | 9781119488323 111948832X 9781119488316 1119488311 9781119488330 1119488338 9781119488057 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Scrivener Publishing/Wiley |
record_format | marc |
spelling | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee First edition. Hoboken, NJ Scrivener Publishing/Wiley 2019 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier "John Wiley & Sons Inc."--title page verso. - Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher "Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"-- Computer security Computer networks Security measures Parallel processing (Electronic computers) Security measures Electronic data processing Distributed processing Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Traitement réparti ; Sécurité ; Mesures COMPUTERS ; Security ; General Parallel processing (Electronic computers) Computer networks ; Security measures Electronic data processing ; Distributed processing ; Security measures Le, Dac-Nhuong 1983- HerausgeberIn edt Kumar, Raghvendra 1987- HerausgeberIn edt Mishra, Brojo Kishore 1979- HerausgeberIn edt Khari, Manju HerausgeberIn edt Chatterjee, Jyotir Moy HerausgeberIn edt 9781119488057 Erscheint auch als Druck-Ausgabe 9781119488057 |
spellingShingle | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies Computer security Computer networks Security measures Parallel processing (Electronic computers) Security measures Electronic data processing Distributed processing Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Traitement réparti ; Sécurité ; Mesures COMPUTERS ; Security ; General Parallel processing (Electronic computers) Computer networks ; Security measures Electronic data processing ; Distributed processing ; Security measures |
title | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies |
title_auth | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies |
title_exact_search | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies |
title_full | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee |
title_fullStr | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee |
title_full_unstemmed | Cyber security in parallel and distributed computing concepts, techniques, applications and case studies edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee |
title_short | Cyber security in parallel and distributed computing |
title_sort | cyber security in parallel and distributed computing concepts techniques applications and case studies |
title_sub | concepts, techniques, applications and case studies |
topic | Computer security Computer networks Security measures Parallel processing (Electronic computers) Security measures Electronic data processing Distributed processing Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Traitement réparti ; Sécurité ; Mesures COMPUTERS ; Security ; General Parallel processing (Electronic computers) Computer networks ; Security measures Electronic data processing ; Distributed processing ; Security measures |
topic_facet | Computer security Computer networks Security measures Parallel processing (Electronic computers) Security measures Electronic data processing Distributed processing Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Traitement réparti ; Sécurité ; Mesures COMPUTERS ; Security ; General Parallel processing (Electronic computers) Computer networks ; Security measures Electronic data processing ; Distributed processing ; Security measures |
work_keys_str_mv | AT ledacnhuong cybersecurityinparallelanddistributedcomputingconceptstechniquesapplicationsandcasestudies AT kumarraghvendra cybersecurityinparallelanddistributedcomputingconceptstechniquesapplicationsandcasestudies AT mishrabrojokishore cybersecurityinparallelanddistributedcomputingconceptstechniquesapplicationsandcasestudies AT kharimanju cybersecurityinparallelanddistributedcomputingconceptstechniquesapplicationsandcasestudies AT chatterjeejyotirmoy cybersecurityinparallelanddistributedcomputingconceptstechniquesapplicationsandcasestudies |