Vorliegende Sprache |
eng |
Hinweise auf parallele Ausgaben |
512517010 Erscheint auch als (Druck-Ausgabe): ‡Gupta, P. K., 1988 - : Predictive computing and information security |
ISBN |
978-981-10-5106-7 |
Name |
Gupta, P.K. |
Tyagi, Vipin ¬[VerfasserIn]¬ |
Name ANZEIGE DER KETTE |
Tyagi, Vipin ¬[VerfasserIn]¬ |
Name |
Singh, S.K. ¬[VerfasserIn]¬ |
T I T E L |
Predictive Computing and Information Security |
Verlagsort |
Singapore |
Verlag |
Springer |
Erscheinungsjahr |
2017 |
2017 |
Umfang |
Online-Ressource (XVII, 162 p. 57 illus, online resource) |
Reihe |
SpringerLink. Bücher |
Titelhinweis |
Erscheint auch als (Druck-Ausgabe): ‡Gupta, P. K., 1988 - : Predictive computing and information security |
Printed editionISBN: 978-981-10-5106-7 |
ISBN |
ISBN 978-981-10-5107-4 |
Klassifikation |
UR |
UTN |
COM053000 |
005.8 |
QA76.9.A25 |
Kurzbeschreibung |
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative use of technologies for enhancing predictive computing and information security. Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing. As such, the book offers a valuable resource for graduate students and researchers interested in exploring predictive modeling techniques and architectures to solve information security, privacy and protection issues in future communication |
2. Kurzbeschreibung |
Introduction -- Predictive Computing and Information Security: A Technical Review -- Predictive Computing -- Cloud Based Predictive Computing -- IoT based Predictive Computing -- Information Security -- Cloud Based Information Security -- IoT Based Information Security -- Applications of Predictive Computing -- Appendix |
1. Schlagwortkette |
Regelungstheorie |
Computersicherheit |
Internet der Dinge |
Cloud Computing |
ANZEIGE DER KETTE |
Regelungstheorie -- Computersicherheit -- Internet der Dinge -- Cloud Computing |
SWB-Titel-Idn |
494008954 |
Signatur |
Springer E-Book |
Bemerkungen |
Elektronischer Volltext - Campuslizenz |
Elektronische Adresse |
$uhttp://dx.doi.org/10.1007/978-981-10-5107-4 |
Internetseite / Link |
Volltext |
Siehe auch |
Cover |