|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
|
|