|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
DEGRUYTEROA_on1125187867 |
003 |
OCoLC |
005 |
20240209213017.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
191022t20192019gw a fob z000 0 eng d |
040 |
|
|
|a DEGRU
|b eng
|e rda
|e pn
|c DEGRU
|d EBLCP
|d N$T
|d YDX
|d YDXIT
|d IUL
|d OSU
|d OCLCQ
|d OCLCO
|d SFB
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ESU
|d DEGRU
|d OCLCL
|
019 |
|
|
|a 1133258813
|a 1133499565
|
020 |
|
|
|a 9783110606058
|q (pdf)
|
020 |
|
|
|a 3110606054
|q (pdf)
|
020 |
|
|
|a 9783110605969
|q (electronic bk.)
|
020 |
|
|
|a 3110605961
|q (electronic bk.)
|
020 |
|
|
|z 9783110605884
|
020 |
|
|
|z 3110605880
|
024 |
7 |
|
|a 10.1515/9783110606058
|2 doi
|
029 |
1 |
|
|a AU@
|b 000066975514
|
035 |
|
|
|a (OCoLC)1125187867
|z (OCoLC)1133258813
|z (OCoLC)1133499565
|
050 |
|
4 |
|a QA76.9.A25
|b B55 2019
|
072 |
|
7 |
|a COM021030
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a ST 277
|2 rvk
|
084 |
|
|
|a ST 530
|2 rvk
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Big data security /
|c edited by Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
|
264 |
|
1 |
|a Berlin ;
|a Boston :
|b De Gruyter,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (ix, 144 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a De Gruyter Frontiers in Computational Intelligence ;
|v volume 3
|
520 |
|
|
|a After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology
|
504 |
|
|
|a Includes bibliographical references
|
505 |
0 |
0 |
|t 1. Introduction /
|r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha --
|t 2. Digital identity protection using blockchain for academic qualification certificates /
|r Mrsic, Leo / Fijacko, Goran / Balkovic, Mislav --
|t 3. Anomaly detection in cloud big database metric /
|r Chowdhury, Souvik / Gupta, Shibakali --
|t 4. Use of big data in hacking and social engineering /
|r Gupta, Shibakali / Mukherjee, Ayan --
|t 5. Steganography, the widely used name for data hiding /
|r Mukherjee, Srilekha / Sanyal, Goutam --
|t 6. Big data security issues with challenges and solutions /
|r Koley, Santanu --
|t 7. Conclusions /
|r Gupta, Shibakali / Banerjee, Indradip / Bhattacharyya, Siddhartha
|
546 |
|
|
|a In English.
|
588 |
0 |
|
|a Online resource, title from digital title page (viewed on September 17, 2020).
|
506 |
0 |
|
|a Open Access
|5 EbpS
|
590 |
|
|
|a De Gruyter Online
|b De Gruyter Open Access eBooks
|
650 |
|
0 |
|a Big data
|x Security measures.
|
650 |
|
6 |
|a Données volumineuses
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Database Management
|x Data Mining.
|2 bisacsh
|
700 |
1 |
|
|a Banerjee, Indradip,
|e editor.
|
700 |
1 |
|
|a Bhattacharyya, Siddhartha,
|d 1975-
|e editor.
|1 https://id.oclc.org/worldcat/entity/E39PCjC9bHm8jq7VtHVvm739fy
|
700 |
1 |
|
|a Gupta, Shibakali,
|e editor.
|
758 |
|
|
|i has work:
|a Big data security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFYpJkjVxgH6w3cMYh7pGd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Big data security.
|d Berlin : De Gruyter, [2019]
|z 9783110605884
|w (OCoLC)1135335027
|
830 |
|
0 |
|a De Gruyter frontiers in computational intelligence ;
|v v. 3.
|
856 |
4 |
0 |
|u https://www.degruyter.com/openurl?genre=book&isbn=9783110606058
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9783110606058
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2330583
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15223056
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16186922
|
994 |
|
|
|a 92
|b IZTAP
|