Security designs for the cloud, IoT, and social networking / edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar.
"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, inv...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, New Jersey : Salem, Massachusetts :
John Wiley & Sons, Inc. ; Scrivener Publishing LLC,
[2019]
|
Edition: | First edition. |
Subjects: |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | b12300143 | ||
005 | 20231215081412.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 190912s2019 nju ob 001 0 eng | ||
010 | |a 2019040595 | ||
019 | |a 1122933516 |a 1225073445 | ||
020 | |a 9781119593188 |q (epub) | ||
020 | |a 1119593182 | ||
020 | |a 9781119593201 |q (adobe pdf) | ||
020 | |a 1119593204 | ||
020 | |a 9781119593171 |q (electronic bk.) | ||
020 | |a 1119593174 |q (electronic bk.) | ||
020 | |z 9781119592266 |q (hardback) | ||
020 | |z 1119592267 | ||
029 | 1 | |a AU@ |b 000066246990 | |
029 | 1 | |a CHNEW |b 001068170 | |
029 | 1 | |a CHVBK |b 577436988 | |
035 | |a (OCoLC)sks1119741622 | ||
035 | |a (OCoLC)1119741622 |z (OCoLC)1122933516 |z (OCoLC)1225073445 | ||
037 | |a sks151004 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d EBLCP |d DG1 |d YDX |d DLC |d OCLCO |d OCLCQ |d S2H |d UMI |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d OCLCO | ||
042 | |a pcc | ||
049 | |a GWRE | ||
050 | 0 | 0 | |a QA76.585 |
245 | 0 | 0 | |a Security designs for the cloud, IoT, and social networking / |c edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar. |
250 | |a First edition. | ||
264 | 1 | |a Hoboken, New Jersey : |b John Wiley & Sons, Inc. ; |a Salem, Massachusetts : |b Scrivener Publishing LLC, |c [2019] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- |c Provided by publisher | ||
588 | 0 | |a Print version record and CIP data provided by publisher. | |
505 | 0 | |a Cover; Title Page; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Part I Security Designs for the Cloud Network; 1 Encryption Algorithm for Data Security in Cloud Computing; 2 Analysis of Security Issues in Cloud Environment; 3 Security and Challenges in Mobile Cloud Computing; 4 Fog Computing and Its Security Issues; 5 Application Safety and Service Vulnerability in Cloud Network; Part II Security Designs for the Internet of Things and Social Networks; 6 IOT Security and Privacy Preservation | |
505 | 8 | |a 7 Automation Movie Recommender System Based on Internet of Things and Clustering8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges; 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System; 10 The Vital Role of Fog Computing in Internet of Things; Part III Security Designs for Solutions and Applications; 11 The Role of Information-Centric Security in the Modern Arena of Information Technology; 12 Enabling Mobile Technology for Healthcare Service Improvements | |
505 | 8 | |a 13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System14 Advancements and Applications in Fog Computing; 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation; 16 Cyberspace for Smart Parenting with Sensors; EULA | |
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Internet of things |x Security measures. | |
650 | 0 | |a Social media |x Security measures. | |
650 | 7 | |a Cloud computing |x Security measures |2 fast | |
700 | 1 | |a Le, Dac-Nhuong, |d 1983- |e editor. | |
700 | 1 | |a Bhatt, Chintan M., |d 1988- |e editor. | |
700 | 1 | |a Madhukar, Mani, |e editor. | |
776 | 0 | 8 | |i Print version: |t Security designs for the cloud, IoT, and social networking. |b First edition. |d Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2019] |z 9781119592266 |w (DLC) 2019040594 |
856 | 4 | 0 | |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=151004 |z Full Text (via Skillsoft) |
915 | |a - | ||
956 | |a Skillsoft ITPro | ||
956 | |b Skillsoft ITPro Skillport Collection | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i 6e7bbdde-ba19-5660-b8d2-1be47d501123 |s 45e13eb6-f8c7-5e15-a828-850569161b8e |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.585 |h Library of Congress classification |i web |n 1 |