|
|
Showing 1 - 4 of
4 matches in All Departments
* The book offers a well-balanced mathematical analysis of
modelling physical systems. * Summarizes basic principles in
differential geometry and convex analysis as needed. * The book
covers a wide range of industrial and social applications, and
bridges the gap between core theory and costly experiments through
simulations and modelling. * The focus of the book is manifold
ranging from stability of fluid flows, nano fluids, drug delivery,
and security of image data to Pandemic modeling etc.
This book presents cybersecurity aspects of ubiquitous and growing
IoT and Cyber Physical Systems. It also introduces a range of
conceptual, theoretical, and foundational access control solutions.
This was developed by the authors to provide an overall broader
perspective and grounded approach to solve access control problems
in IoT and CPS. The authors discuss different architectures,
frameworks, access control models, implementation scenarios, and a
broad set of use-cases in different IoT and CPS domains. This
provides readers an intuitive and easy to read set of chapters. The
authors also discuss IoT and CPS access control solutions provided
by key industry players including Amazon Web Services (AWS) and
Google Cloud Platform (GCP). It provides extensions of the authors
proposed fine grained solutions with these widely used cloud and
edge supported platforms. This book is designed to serve the
computer science and the cybersecurity community including
researchers, academicians and students. Practitioners who have a
wider interest in IoT, CPS, privacy and security aspects will also
find this book useful. Thanks to the holistic planning and
thoughtful organization of this book, the readers are expected to
gain in-depth knowledge of the state-of-the-art access control
architectures and security models for resilient IoT and CPS.
Converging Ideas and computing domains. Novel CPS architectures and
Models Dependable, reliable and autonomic computing Privacy and
trust in edge computing Truthful Computing
Highlights solutions for Secure and Privacy of Big Data Offers
Use-case studies for Trustworthy Computing Discusses different
secure Big Data Architectures Covers aspects and analysis of Big
Data platforms Provides trans-disciplinary approach for distributed
systems and Big Data.
|
You may like...
Daydream
Hannah Grace
Paperback
R300
R268
Discovery Miles 2 680
The Warning
James Patterson, Robison Wells
Paperback
(1)
R261
R238
Discovery Miles 2 380
The Catch
Amy Lea
Paperback
R250
R223
Discovery Miles 2 230
|