Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Mishra, Brojo Kishore
, Khari, Manju
, Kumar, Raghvendra
, Chatterjee, Jyotir Moy
, Le, Dac-Nhuong
in
Computer networks
/ Computer networks -- Security measures
/ Computer security
/ Electronic data processing
/ Electronic data processing -- Distributed processing -- Security measures
/ Parallel processing (Electronic computers)
/ Parallel processing (Electronic computers) -- Security measures
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Mishra, Brojo Kishore
, Khari, Manju
, Kumar, Raghvendra
, Chatterjee, Jyotir Moy
, Le, Dac-Nhuong
in
Computer networks
/ Computer networks -- Security measures
/ Computer security
/ Electronic data processing
/ Electronic data processing -- Distributed processing -- Security measures
/ Parallel processing (Electronic computers)
/ Parallel processing (Electronic computers) -- Security measures
2019
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Mishra, Brojo Kishore
, Khari, Manju
, Kumar, Raghvendra
, Chatterjee, Jyotir Moy
, Le, Dac-Nhuong
in
Computer networks
/ Computer networks -- Security measures
/ Computer security
/ Electronic data processing
/ Electronic data processing -- Distributed processing -- Security measures
/ Parallel processing (Electronic computers)
/ Parallel processing (Electronic computers) -- Security measures
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
eBook
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
2019
Request Book From Autostore
and Choose the Collection Method
Overview
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book. This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.
Publisher
John Wiley & Sons,Scrivener Pub,John Wiley & Sons, Incorporated,Wiley-Blackwell
Subject
ISBN
1119488052, 9781119488057
This website uses cookies to ensure you get the best experience on our website.