Security designs for the cloud, IoT, and social networking
by
 
Le, Dac-Nhuong, 1983- editor.

Title
Security designs for the cloud, IoT, and social networking

Author
Le, Dac-Nhuong, 1983- editor.

ISBN
9781119593188
 
9781119593201
 
9781119593171

Edition
First edition.

Physical Description
1 online resource

Contents
Cover; Title Page; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Part I Security Designs for the Cloud Network; 1 Encryption Algorithm for Data Security in Cloud Computing; 2 Analysis of Security Issues in Cloud Environment; 3 Security and Challenges in Mobile Cloud Computing; 4 Fog Computing and Its Security Issues; 5 Application Safety and Service Vulnerability in Cloud Network; Part II Security Designs for the Internet of Things and Social Networks; 6 IOT Security and Privacy Preservation
 
7 Automation Movie Recommender System Based on Internet of Things and Clustering8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges; 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System; 10 The Vital Role of Fog Computing in Internet of Things; Part III Security Designs for Solutions and Applications; 11 The Role of Information-Centric Security in the Modern Arena of Information Technology; 12 Enabling Mobile Technology for Healthcare Service Improvements
 
13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System14 Advancements and Applications in Fog Computing; 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation; 16 Cyberspace for Smart Parenting with Sensors; EULA

Abstract
"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- Provided by publisher

Local Note
John Wiley and Sons

Subject Term
Cloud computing -- Security measures.
 
Internet of things -- Security measures.
 
Social media -- Security measures.
 
Infonuagique -- Sécurité -- Mesures.
 
Internet des objets -- Sécurité -- Mesures.
 
Médias sociaux -- Sécurité -- Mesures.
 
Networking.
 
COMPUTERS.
 
Cloud computing -- Security measures

Genre
Electronic books.

Added Author
Le, Dac-Nhuong, 1983-
 
Bhatt, Chintan M., 1988-
 
Madhukar, Mani,

Electronic Access
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171


LibraryMaterial TypeItem BarcodeShelf Number[[missing key: search.ChildField.HOLDING]]Status
Online LibraryE-Book595493-1001QA76.585Wiley E-Kitap Koleksiyonu