Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management

Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management PDF Author: Karthikeyan, P.
Publisher: IGI Global
ISBN: 1522540458
Category : Computers
Languages : en
Pages : 300

Get Book

Book Description
From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management

Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management PDF Author: Karthikeyan, P.
Publisher: IGI Global
ISBN: 1522540458
Category : Computers
Languages : en
Pages : 300

Get Book

Book Description
From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities PDF Author: Gunasekhar, T.
Publisher: IGI Global
ISBN: 1522579257
Category : Computers
Languages : en
Pages : 113

Get Book

Book Description
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities

Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities PDF Author: Swain, Gandharba
Publisher: IGI Global
ISBN: 1522575170
Category : Computers
Languages : en
Pages : 201

Get Book

Book Description
In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world’s communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.

Research Anthology on Big Data Analytics, Architectures, and Applications

Research Anthology on Big Data Analytics, Architectures, and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668436639
Category : Computers
Languages : en
Pages : 1988

Get Book

Book Description
Society is now completely driven by data with many industries relying on data to conduct business or basic functions within the organization. With the efficiencies that big data bring to all institutions, data is continuously being collected and analyzed. However, data sets may be too complex for traditional data-processing, and therefore, different strategies must evolve to solve the issue. The field of big data works as a valuable tool for many different industries. The Research Anthology on Big Data Analytics, Architectures, and Applications is a complete reference source on big data analytics that offers the latest, innovative architectures and frameworks and explores a variety of applications within various industries. Offering an international perspective, the applications discussed within this anthology feature global representation. Covering topics such as advertising curricula, driven supply chain, and smart cities, this research anthology is ideal for data scientists, data analysts, computer engineers, software engineers, technologists, government officials, managers, CEOs, professors, graduate students, researchers, and academicians.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics PDF Author: Khosrow-Pour, D.B.A., Mehdi
Publisher: IGI Global
ISBN: 1522575995
Category : Computers
Languages : en
Pages : 1857

Get Book

Book Description
From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations are becoming increasingly more wireless, ensuring the security and seamless function of electronic gadgets while creating a strong network is imperative. Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data. This book is an important resource for information technology professionals, software developers, data analysts, graduate-level students, researchers, computer engineers, and IT specialists seeking modern information on emerging methods in data mining, information technology, and wireless networks.

Healthcare Data Analytics and Management

Healthcare Data Analytics and Management PDF Author: Nilanjan Dey
Publisher: Academic Press
ISBN: 0128156368
Category : Science
Languages : en
Pages : 340

Get Book

Book Description
Healthcare Data Analytics and Management help readers disseminate cutting-edge research that delivers insights into the analytic tools, opportunities, novel strategies, techniques and challenges for handling big data, data analytics and management in healthcare. As the rapidly expanding and heterogeneous nature of healthcare data poses challenges for big data analytics, this book targets researchers and bioengineers from areas of machine learning, data mining, data management, and healthcare providers, along with clinical researchers and physicians who are interested in the management and analysis of healthcare data. Covers data analysis, management and security concepts and tools in the healthcare domain Highlights electronic medical health records and patient information records Discusses the different techniques to integrate Big data and Internet-of-Things in healthcare, including machine learning and data mining Includes multidisciplinary contributions in relation to healthcare applications and challenges

Fog Data Analytics for IoT Applications

Fog Data Analytics for IoT Applications PDF Author: Sudeep Tanwar
Publisher: Springer Nature
ISBN: 9811560447
Category : Technology & Engineering
Languages : en
Pages : 501

Get Book

Book Description
This book discusses the unique nature and complexity of fog data analytics (FDA) and develops a comprehensive taxonomy abstracted into a process model. The exponential increase in sensors and smart gadgets (collectively referred as smart devices or Internet of things (IoT) devices) has generated significant amount of heterogeneous and multimodal data, known as big data. To deal with this big data, we require efficient and effective solutions, such as data mining, data analytics and reduction to be deployed at the edge of fog devices on a cloud. Current research and development efforts generally focus on big data analytics and overlook the difficulty of facilitating fog data analytics (FDA). This book presents a model that addresses various research challenges, such as accessibility, scalability, fog nodes communication, nodal collaboration, heterogeneity, reliability, and quality of service (QoS) requirements, and includes case studies demonstrating its implementation. Focusing on FDA in IoT and requirements related to Industry 4.0, it also covers all aspects required to manage the complexity of FDA for IoT applications and also develops a comprehensive taxonomy.

Cloud Security: Concepts, Methodologies, Tools, and Applications

Cloud Security: Concepts, Methodologies, Tools, and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1522581774
Category : Computers
Languages : en
Pages : 2218

Get Book

Book Description
Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data on the cloud is imperative. Cloud Security: Concepts, Methodologies, Tools, and Applications explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud, this multi-volume book is ideally designed for IT specialists, web designers, computer engineers, software developers, academicians, researchers, and graduate-level students interested in cloud computing concepts and security.

Handbook of Smart Materials, Technologies, and Devices

Handbook of Smart Materials, Technologies, and Devices PDF Author: Chaudhery Mustansar Hussain
Publisher: Springer Nature
ISBN: 3030842053
Category : Technology & Engineering
Languages : en
Pages : 2831

Get Book

Book Description
This handbook brings together technical expertise, conceptual background, applications, and societal aspects of Industry 4.0: the evolution of automation and data exchange in fabrication technologies, materials processing, and device manufacturing at both experimental and theoretical model scales. The book assembles all the aspects of Industry 4.0, starting from the emergence of the concept to the consequences of its progression. Drawing on expert contributors from around the world, the volume details the technologies that sparked the fourth revolution and illustrates their characteristics, potential, and methods of use in the industrial and societal domains. In addition, important topics such as ethics, privacy and security are considered in a reality where all data is shared and saved remotely. The collection of contribution serve a very broad audience working in the fields of science and engineering, chemical engineering, materials science, nanotechnology, energy, environment, green chemistry, sustainability, electrical and electronic engineering, solid-state physics, surface science, aerosol technology, chemistry, colloid science, device engineering, and computer technology. This handbook ideal reference libraries in universities and industrial institutions, government and independent institutes, individual research groups and scientists.

Secure Edge Computing

Secure Edge Computing PDF Author: Mohiuddin Ahmed
Publisher: CRC Press
ISBN: 1000427323
Category : Computers
Languages : en
Pages : 364

Get Book

Book Description
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.