244,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
122 °P sammeln
  • Gebundenes Buch

The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which…mehr

Produktbeschreibung
The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media. The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network; Part 2 focuses on Security Designs for the Internet of Things and Social Networks; while the concluding Part looks at Security Designs for Solutions and Applications. Collectively, the chapters * Help researchers and practitioners understand the security architectures in IoT and cloud ecosystems, as well as the state-of-the-art in social media security countermeasures * Explore how the threats in IoT are different from traditional networks * Provide a comprehensive discussion on the security challenges and solutions in IoT, cloud and social media. Audience This book is directed to IT engineers, programmers, security professionals, and a wide array of interested hackers and device makers requiring an understanding of the vulnerabilities associated with the Internet of Things and cloud computing.
Autorenporträt
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books. Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing. Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.