Security in Big Data: A Succinct Survey.- Big Data Driven Privacy and Security Issues and Challenges.- Big Data Process based Security and Privacy Issues and Measures.- Exploring and Presenting Security Measures in Big Data Paradigm.- Comparative Analysis of Anonymization Techniques.- Standarlization of Big Data and Polices.- Privacy Preserving Cryptographic Model for Big Data Analytics.- Application of Big Data Analytics in Healthcare Industry along with its Security Issues.- An Analytical Perspective of Machine Learning in Cyber Security.- Business Intelligence Influenced Customer Relationship Management in Telecommunication industry and its Security Challenges.- Data Protection and Data Privacy Act for Big Data Governance.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Dr. Pradip Kumar Das is currently Professor in the Department of Computer Science & Engineering in IIT Guwahati. He completed his B.Sc. degree with Statistics major from Arya Vidyapeeth College, Guwahati, in 1989, and M.Sc. in Mathematical Statistics from Delhi University, North campus, and he was awarded the Ph.D. degree in Computer Science in the area of Automatic Computer Speech Recognition using Vector Quantization and Hidden Markov Modelling.
Dr. Das is a CSIR NET qualified JRF/SRF Fellow and worked in CEERI, Delhi, for 5 years and as Scientist Fellow in HRD group of CSIR (Automation section) for about two years. He has published more than 100 papers in international journals and conferences in India and abroad. Dr. Das has executed 14 sponsored projects and consultancies from agencies like MHRD, Department of Electronics, DST, Ministry of Social Justice and UNICEF. He has filed for a patent on speaker characterization. He has held the position ofOrganizing Vice Chairman, IIT JEE 2009, Vice President IIT Club, etc. He has visited numerous countries to present his research work in conferences and meetings. His research interests include speech recognition, analysis and characterization, image processing, Internet of things, AI, smart devices, algorithms and software engineering.
Dr. Hrudaya Kumar Tripathy completed his B.Tech. in Ceramics Technology from Indian Institute of Ceramics, Kolkata, MCA degree from Madurai Kamaraj University, and M.Tech. in Computer Science & Engineering from IIT Guwahati, and he was awarded the Ph.D. degree in Computer Science from Berhampur University.
Dr. Tripathy is currently an Associate Professor at the School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Deemed to be University (Institute of Eminence), Bhubaneswar, in India. He has 20 years of teaching experience in Computer Science at the undergraduate and postgraduate levels. Dr. Tripathy was invited as Visiting Senior Faculty by Asia Pacific University (APU), Kuala Lumpur, Malaysia, and Universiti Utara Malaysia, Sintok, Kedah, Malaysia. He was awarded the Young IT professional award 2013 on a regional level from the Computer Society of India (CSI). He has published many research papers in reputed international refereed journals & conferences. He is a senior member of IEEE society, a member of IET, and a life member of CSI. Dr. Tripathy's research interests focus on machine learning, data analytics, robotics & artificial intelligence, speech processing & IoT.
Dr. Shafiz Affendi Mohd Yusof received the B.S. degree in Information Technology from University Utara Malaysia, Malaysia, in 1996, M.S. degree in Telecommunications and Network Management in 1998, M.Phil. degree in Information Transfer and Ph.D. degree in Information Science and Technology in 2005 from Syracuse University, Syracuse, USA.
He is currently Associate Professor at the Faculty of Engineering and Information Sciences, University of Wollongong in Dubai. He is Discipline Leader for Master of Information Technology Management (MITM) and Head of the Information Systems and Technology (INSTECH) Research Group. From 2012 to 2016, he was a faculty member of the School of Computing as Associate Professor in University Utara Malaysia. He held various other senior roles including Director of International Telecommunication Union - Universiti Utara Malaysia Asia Pacific Centre of Excellence (ITU-UUM ASP CoE) for Rural Information and Communication Technologies (ICT) Development and Deputy Director of Cooperative and Entrepreneurship Development Institute (CEDI). He is a certified professional trainer (Train of Trainers' Programme) under the Ministry of Human Resource, Malaysia, and has conducted several workshops on computers and ICT.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 17,61 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisEUR 9,70 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : moluna, Greven, Allemagne
Gebunden. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Presents cutting edge research addressing privacy and security protection challenges of big data using Business IntelligenceDiscusses the challenges and suggestions to meet the requirements of computing, communication, and storage capabilit. N° de réf. du vendeur 443664639
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9789811610066_new
Quantité disponible : Plus de 20 disponibles
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of 'Business Intelligence'. The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business. 224 pp. Englisch. N° de réf. du vendeur 9789811610066
Quantité disponible : 2 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Buch. Etat : Neu. Neuware -This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of ¿Business Intelligence¿. The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 224 pp. Englisch. N° de réf. du vendeur 9789811610066
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Buch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of 'Business Intelligence'. The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business. N° de réf. du vendeur 9789811610066
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 43204481-n
Quantité disponible : Plus de 20 disponibles
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9789811610066
Quantité disponible : Plus de 20 disponibles
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
Etat : New. N° de réf. du vendeur ABLIING23Apr0412070091410
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 43204481
Quantité disponible : Plus de 20 disponibles
Vendeur : Best Price, Torrance, CA, Etats-Unis
Etat : New. SUPER FAST SHIPPING. N° de réf. du vendeur 9789811610066
Quantité disponible : 1 disponible(s)