Normal view MARC view ISBD view

Security designs for the cloud, IoT, and social networking / edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar.

Contributor(s): Le, Dac-Nhuong, 1983- [editor.] | Bhatt, Chintan M, 1988- [editor.] | Madhukar, Mani [editor.].
Material type: materialTypeLabelBookPublisher: Hoboken, New Jersey : Salem, Massachusetts : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, [2019]Edition: First edition.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781119593188; 1119593182; 9781119593201; 1119593204; 9781119593171; 1119593174.Subject(s): Cloud computing -- Security measures | Internet of things -- Security measures | Social media -- Security measuresGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Security designs for the cloud, IoT, and social networking.DDC classification: 004.67/82 Online resources: Wiley Online Library
Contents:
Cover; Title Page; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Part I Security Designs for the Cloud Network; 1 Encryption Algorithm for Data Security in Cloud Computing; 2 Analysis of Security Issues in Cloud Environment; 3 Security and Challenges in Mobile Cloud Computing; 4 Fog Computing and Its Security Issues; 5 Application Safety and Service Vulnerability in Cloud Network; Part II Security Designs for the Internet of Things and Social Networks; 6 IOT Security and Privacy Preservation
7 Automation Movie Recommender System Based on Internet of Things and Clustering8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges; 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System; 10 The Vital Role of Fog Computing in Internet of Things; Part III Security Designs for Solutions and Applications; 11 The Role of Information-Centric Security in the Modern Arena of Information Technology; 12 Enabling Mobile Technology for Healthcare Service Improvements
13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System14 Advancements and Applications in Fog Computing; 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation; 16 Cyberspace for Smart Parenting with Sensors; EULA
Summary: "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- Provided by publisher
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- Provided by publisher

Print version record and CIP data provided by publisher.

Cover; Title Page; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Part I Security Designs for the Cloud Network; 1 Encryption Algorithm for Data Security in Cloud Computing; 2 Analysis of Security Issues in Cloud Environment; 3 Security and Challenges in Mobile Cloud Computing; 4 Fog Computing and Its Security Issues; 5 Application Safety and Service Vulnerability in Cloud Network; Part II Security Designs for the Internet of Things and Social Networks; 6 IOT Security and Privacy Preservation

7 Automation Movie Recommender System Based on Internet of Things and Clustering8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges; 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System; 10 The Vital Role of Fog Computing in Internet of Things; Part III Security Designs for Solutions and Applications; 11 The Role of Information-Centric Security in the Modern Arena of Information Technology; 12 Enabling Mobile Technology for Healthcare Service Improvements

13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System14 Advancements and Applications in Fog Computing; 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation; 16 Cyberspace for Smart Parenting with Sensors; EULA

There are no comments for this item.

Log in to your account to post a comment.