Big Data Security / / Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Saved in:
Bibliographic Details
Funder:
:
HerausgeberIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter,, [2019]
©2019
Year of Publication:2019
Language:English
Series:De Gruyter frontiers in computational intelligence ; Volume 3.
Physical Description:1 online resource (ix, 144 pages) :; illustrations.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993547209804498
ctrlnum (CKB)4100000009751852
(MiAaPQ)EBC5995023
(DE-B1597)497309
(OCoLC)1125187867
(DE-B1597)9783110606058
(ScCtBLL)e3c48ffd-2b31-428d-a829-ac91ba049d1c
(oapen)https://directory.doabooks.org/handle/20.500.12854/42090
(EXLCZ)994100000009751852
collection bib_alma
record_format marc
spelling Banerjee, Indradip auth
Big Data Security / Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.
De Gruyter 2019
Berlin ; Boston : De Gruyter, [2019]
©2019
1 online resource (ix, 144 pages) : illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
De Gruyter Frontiers in Computational Intelligence ; 3
Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Apr 2020)
This eBook is made available Open Access under a CC BY-NC-ND 4.0 license: https://creativecommons.org/licenses/by-nc-nd/4.0 https://www.degruyter.com/dg/page/open-access-policy
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
In English.
funded by Knowledge Unlatched
Open access Unrestricted online access star
Frontmatter -- Preface -- Contents -- List of Contributors -- 1. Introduction -- 2. Digital identity protection using blockchain for academic qualification certificates -- 3. Anomaly detection in cloud big database metric -- 4. Use of big data in hacking and social engineering -- 5. Steganography, the widely used name for data hiding -- 6. Big data security issues with challenges and solutions -- 7. Conclusions
Issued also in print.
Big data.
Banerjee, Indradip, editor. edt http://id.loc.gov/vocabulary/relators/edt
Bhattacharyya, Siddhartha, editor. edt http://id.loc.gov/vocabulary/relators/edt
Gupta, Shibakali, editor. edt http://id.loc.gov/vocabulary/relators/edt
Knowledge Unlatched funder. fnd http://id.loc.gov/vocabulary/relators/fnd
3-11-060588-0
De Gruyter frontiers in computational intelligence ; Volume 3.
language English
format eBook
author Banerjee, Indradip
spellingShingle Banerjee, Indradip
Big Data Security /
De Gruyter Frontiers in Computational Intelligence ;
Frontmatter --
Preface --
Contents --
List of Contributors --
1. Introduction --
2. Digital identity protection using blockchain for academic qualification certificates --
3. Anomaly detection in cloud big database metric --
4. Use of big data in hacking and social engineering --
5. Steganography, the widely used name for data hiding --
6. Big data security issues with challenges and solutions --
7. Conclusions
author_facet Banerjee, Indradip
Banerjee, Indradip,
Banerjee, Indradip,
Bhattacharyya, Siddhartha,
Bhattacharyya, Siddhartha,
Gupta, Shibakali,
Gupta, Shibakali,
Knowledge Unlatched
Knowledge Unlatched
Knowledge Unlatched
author_variant i b ib
author2 Banerjee, Indradip,
Banerjee, Indradip,
Bhattacharyya, Siddhartha,
Bhattacharyya, Siddhartha,
Gupta, Shibakali,
Gupta, Shibakali,
Knowledge Unlatched
Knowledge Unlatched
author2_variant i b ib
i b ib
s b sb
s b sb
s g sg
s g sg
author2_role HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
Funder
author_corporate Knowledge Unlatched
author_corporate_role Funder
author_sort Banerjee, Indradip
title Big Data Security /
title_full Big Data Security / Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.
title_fullStr Big Data Security / Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.
title_full_unstemmed Big Data Security / Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.
title_auth Big Data Security /
title_alt Frontmatter --
Preface --
Contents --
List of Contributors --
1. Introduction --
2. Digital identity protection using blockchain for academic qualification certificates --
3. Anomaly detection in cloud big database metric --
4. Use of big data in hacking and social engineering --
5. Steganography, the widely used name for data hiding --
6. Big data security issues with challenges and solutions --
7. Conclusions
title_new Big Data Security /
title_sort big data security /
series De Gruyter Frontiers in Computational Intelligence ;
series2 De Gruyter Frontiers in Computational Intelligence ;
publisher De Gruyter
De Gruyter,
publishDate 2019
physical 1 online resource (ix, 144 pages) : illustrations.
Issued also in print.
contents Frontmatter --
Preface --
Contents --
List of Contributors --
1. Introduction --
2. Digital identity protection using blockchain for academic qualification certificates --
3. Anomaly detection in cloud big database metric --
4. Use of big data in hacking and social engineering --
5. Steganography, the widely used name for data hiding --
6. Big data security issues with challenges and solutions --
7. Conclusions
isbn 3-11-060596-1
3-11-060605-4
3-11-060588-0
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 B45 B54 42019
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.7
dewey-sort 15.7
dewey-raw 005.7
dewey-search 005.7
oclc_num 1125187867
work_keys_str_mv AT banerjeeindradip bigdatasecurity
AT bhattacharyyasiddhartha bigdatasecurity
AT guptashibakali bigdatasecurity
AT knowledgeunlatched bigdatasecurity
status_str n
ids_txt_mv (CKB)4100000009751852
(MiAaPQ)EBC5995023
(DE-B1597)497309
(OCoLC)1125187867
(DE-B1597)9783110606058
(ScCtBLL)e3c48ffd-2b31-428d-a829-ac91ba049d1c
(oapen)https://directory.doabooks.org/handle/20.500.12854/42090
(EXLCZ)994100000009751852
carrierType_str_mv cr
hierarchy_sequence Volume 3.
is_hierarchy_title Big Data Security /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1801159555406626816
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03059nam a22005895i 4500</leader><controlfield tag="001">993547209804498</controlfield><controlfield tag="005">20240606150332.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr#cnu||||||||</controlfield><controlfield tag="008">200406t20192019gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-11-060596-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-11-060605-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110606058</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000009751852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5995023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)497309</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1125187867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)9783110606058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ScCtBLL)e3c48ffd-2b31-428d-a829-ac91ba049d1c</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/42090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000009751852</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.B45</subfield><subfield code="b">.B54 2019</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM021030</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Banerjee, Indradip</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Big Data Security /</subfield><subfield code="c">Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">De Gruyter</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">De Gruyter,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 144 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Frontiers in Computational Intelligence ;</subfield><subfield code="v">3</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Apr 2020)</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">This eBook is made available Open Access under a CC BY-NC-ND 4.0 license:</subfield><subfield code="u">https://creativecommons.org/licenses/by-nc-nd/4.0</subfield><subfield code="u">https://www.degruyter.com/dg/page/open-access-policy</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="536" ind1=" " ind2=" "><subfield code="a">funded by Knowledge Unlatched</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter --</subfield><subfield code="t">Preface --</subfield><subfield code="t">Contents --</subfield><subfield code="t">List of Contributors --</subfield><subfield code="t">1. Introduction --</subfield><subfield code="t">2. Digital identity protection using blockchain for academic qualification certificates --</subfield><subfield code="t">3. Anomaly detection in cloud big database metric --</subfield><subfield code="t">4. Use of big data in hacking and social engineering --</subfield><subfield code="t">5. Steganography, the widely used name for data hiding --</subfield><subfield code="t">6. Big data security issues with challenges and solutions --</subfield><subfield code="t">7. Conclusions</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Big data.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Banerjee, Indradip,</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhattacharyya, Siddhartha,</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Shibakali,</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Knowledge Unlatched</subfield><subfield code="e">funder.</subfield><subfield code="4">fnd</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/fnd</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-11-060588-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">De Gruyter frontiers in computational intelligence ;</subfield><subfield code="v">Volume 3.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-06-07 01:41:29 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338425520004498&amp;Force_direct=true</subfield><subfield code="Z">5338425520004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338425520004498</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5339619310004498&amp;Force_direct=true</subfield><subfield code="Z">5339619310004498</subfield><subfield code="b">Available</subfield><subfield code="8">5339619310004498</subfield></datafield></record></collection>