|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910254849103321 |
|
|
Autore |
Gupta P.K |
|
|
Titolo |
Predictive Computing and Information Security / / by P.K. Gupta, Vipin Tyagi, S.K. Singh |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer, , [2017] |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxi, 162 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data structures (Computer science) |
Data mining |
Application software |
Computational intelligence |
Information storage and retrieval |
Systems and Data Security |
Data Structures and Information Theory |
Data Mining and Knowledge Discovery |
Information Systems Applications (incl. Internet) |
Computational Intelligence |
Information Storage and Retrieval |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Predictive Computing and Information Security: A Technical Review -- Predictive Computing -- Cloud Based Predictive Computing -- IoT based Predictive Computing -- Information Security -- Cloud Based Information Security -- IoT Based Information Security -- Applications of Predictive Computing -- Appendix. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative use of technologies for enhancing |
|
|
|
|
|
|
|
|
|
|
predictive computing and information security. Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing. As such, the book offers a valuable resource for graduate students and researchers interested in exploring predictive modeling techniques and architectures to solve information security, privacy and protection issues in future communication. |
|
|
|
|
|
| |