0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021) Loot Price: R4,009
Discovery Miles 40 090
Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)

Wei Chang, Jie Wu

Series: Advances in Information Security, 83

 (sign in to rate)
Loot Price R4,009 Discovery Miles 40 090 | Repayment Terms: R376 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

General

Imprint: Springer Nature Switzerland AG
Country of origin: Switzerland
Series: Advances in Information Security, 83
Release date: 2021
First published: 2021
Editors: Wei Chang • Jie Wu
Dimensions: 235 x 155mm (L x W)
Format: Hardcover
Pages: 418
Edition: 1st ed. 2021
ISBN-13: 978-3-03-057327-0
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Books > Computing & IT > Applications of computing > Databases > General
Promotions
LSN: 3-03-057327-3
Barcode: 9783030573270

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,554 R1,246 Discovery Miles 12 460
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310

See more

Partners