Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of "Business Intelligence". The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business.
This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of "Business Intelligence". The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business.
This book constitutes the refereed proceedings of the 4th International Conference on Information, Communication and Computing Technology, ICICCT 2019, held in New Delhi, India, in May 2019.The 23 full papers and one short paper presented in this volume were carefully reviewed and selected from 120 submissions. The papers are organized in topical sections on communication and network systems; and emerging computing technologies.
The book deals with situations, personalities, and events following the writer's return to his hometown, Calcutta (Kolkata), after a prolonged period of absence, and recounts his observations, some in retrospect, of the changes that have taken place since he left. The author is not given to mushy sentimentalism. It is, in many ways, a critique of the Bengali psyche and the demographic changes that have affected the way of life of the average citizen seen from the perspective of an individual born into privilege. Among other things, the book examines the man/woman relationship and provides interesting cameos of the writer's perceptions of Indian womanhood and, in general terms, the truths that he holds dear to his heart. The book is divided into five chapters, including some amusing anecdotes.
|
You may like...
Alfred's Basic Piano Library Lesson…
Willard A Palmer, Morton Manus, …
Paperback
Music For Little Mozarts - Music Lesson…
Christine H. Barden, Gayle Kowalchyk, …
Staple bound
Sound Innovations Concert Band - Eb Alto…
Robert Sheldon, Peter Boonshaft, …
Sheet music
|