![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
* The book offers a well-balanced mathematical analysis of modelling physical systems. * Summarizes basic principles in differential geometry and convex analysis as needed. * The book covers a wide range of industrial and social applications, and bridges the gap between core theory and costly experiments through simulations and modelling. * The focus of the book is manifold ranging from stability of fluid flows, nano fluids, drug delivery, and security of image data to Pandemic modeling etc.
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
Converging Ideas and computing domains. Novel CPS architectures and Models Dependable, reliable and autonomic computing Privacy and trust in edge computing Truthful Computing
Highlights solutions for Secure and Privacy of Big Data Offers Use-case studies for Trustworthy Computing Discusses different secure Big Data Architectures Covers aspects and analysis of Big Data platforms Provides trans-disciplinary approach for distributed systems and Big Data.
|
![]() ![]() You may like...
Alice's Adventures in Wonderland and…
Lewis Carroll
Hardcover
![]()
Project Management For Engineering…
John M. Nicholas, Herman Steyn
Paperback
R581
Discovery Miles 5 810
|