000 04370cam a2200649 i 4500
001 on1119741622
003 OCoLC
005 20220711203711.0
006 m o d
007 cr |||||||||||
008 190912s2019 nju ob 001 0 eng
010 _a 2019040595
040 _aDLC
_beng
_erda
_epn
_cDLC
_dEBLCP
_dDG1
_dYDX
_dDLC
_dOCLCO
_dOCLCQ
_dS2H
_dUMI
_dOCLCQ
019 _a1122933516
_a1225073445
020 _a9781119593188
_q(epub)
020 _a1119593182
020 _a9781119593201
_q(adobe pdf)
020 _a1119593204
020 _a9781119593171
_q(electronic bk.)
020 _a1119593174
_q(electronic bk.)
020 _z9781119592266
_q(hardback)
020 _z1119592267
029 1 _aAU@
_b000066246990
029 1 _aCHNEW
_b001068170
029 1 _aCHVBK
_b577436988
035 _a(OCoLC)1119741622
_z(OCoLC)1122933516
_z(OCoLC)1225073445
037 _aCL0501000171
_bSafari Books Online
042 _apcc
050 0 0 _aQA76.585
082 0 0 _a004.67/82
_223
049 _aMAIN
245 0 0 _aSecurity designs for the cloud, IoT, and social networking /
_cedited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar.
250 _aFirst edition.
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc. ;
_aSalem, Massachusetts :
_bScrivener Publishing LLC,
_c[2019]
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"--
_cProvided by publisher
588 0 _aPrint version record and CIP data provided by publisher.
505 0 _aCover; Title Page; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Part I Security Designs for the Cloud Network; 1 Encryption Algorithm for Data Security in Cloud Computing; 2 Analysis of Security Issues in Cloud Environment; 3 Security and Challenges in Mobile Cloud Computing; 4 Fog Computing and Its Security Issues; 5 Application Safety and Service Vulnerability in Cloud Network; Part II Security Designs for the Internet of Things and Social Networks; 6 IOT Security and Privacy Preservation
505 8 _a7 Automation Movie Recommender System Based on Internet of Things and Clustering8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges; 9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System; 10 The Vital Role of Fog Computing in Internet of Things; Part III Security Designs for Solutions and Applications; 11 The Role of Information-Centric Security in the Modern Arena of Information Technology; 12 Enabling Mobile Technology for Healthcare Service Improvements
505 8 _a13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System14 Advancements and Applications in Fog Computing; 15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation; 16 Cyberspace for Smart Parenting with Sensors; EULA
650 0 _aCloud computing
_xSecurity measures.
_94647
650 0 _aInternet of things
_xSecurity measures.
_96353
650 0 _aSocial media
_xSecurity measures.
_910076
655 0 _aElectronic books.
_93294
655 4 _aElectronic books.
_93294
700 1 _aLe, Dac-Nhuong,
_d1983-
_eeditor.
_910077
700 1 _aBhatt, Chintan M.,
_d1988-
_eeditor.
_910078
700 1 _aMadhukar, Mani,
_eeditor.
_910079
776 0 8 _iPrint version:
_tSecurity designs for the cloud, IoT, and social networking.
_bFirst edition.
_dHoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2019]
_z9781119592266
_w(DLC) 2019040594
856 4 0 _uhttps://doi.org/10.1002/9781119593171
_zWiley Online Library
942 _cEBK
994 _aC0
_bDG1
999 _c69598
_d69598