Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Combating Security Challenges in the Age of Big Data

Best Price (Coupon Required):
Buy Combating Security Challenges in the Age of Big Data for $134.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $149.00 - $149.00
BEST PRICE

Single Product Purchase

$134.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$149.00 $149.00

10% OFF
This deals requires coupon
$134.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783030356415
Condition
New
Product Description

This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars. The book explains how the security needs and implementations are inherently different at different stages of the big data centric system, namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state-of-the-art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Psychosomatic Medicine

Psychosomatic Medicine

$39.99
Theoretical Surface Science

Theoretical Surface Science

$74.99
Intellectual Property Rights in Pharmaceutical Test Data

Intellectual Property Rights in Pharmaceutical Test Data

$129.00
Practical Hadoop Security

Practical Hadoop Security

$49.99
Initiatives in Logic

Initiatives in Logic

$169.99
Dictionary of Physics

Dictionary of Physics

$1,999.99
Macroeconomic Analysis and Economic Policy Based on Parametric Control

Macroeconomic Analysis and Economic Policy Based on Parametric Control

$109.99
Programming Languages

Programming Languages

$129.00
The Palgrave Handbook of Transformational Giftedness for Education

The Palgrave Handbook of Transformational Giftedness for Education

$199.99
MathCamp + LitCamp Purple Bunk Grades 5-6

MathCamp + LitCamp Purple Bunk Grades 5-6

$1,289.00
Algorithms and Complexity

Algorithms and Complexity

$39.99
Baby Animals Pack

Baby Animals Pack

$6.99
Die Arbeitsbewertung in Kreditinstituten

Die Arbeitsbewertung in Kreditinstituten

$59.99
The Hippocampus from Cells to Systems

The Hippocampus from Cells to Systems

$299.99
American Royalty

American Royalty

$54.99
Watsuji Tetsurs Global Ethics of Emptiness

Watsuji Tetsurs Global Ethics of Emptiness

$179.99
Ausschreibungshilfe Auenanlagen und Tiefbau

Ausschreibungshilfe Auenanlagen und Tiefbau

$64.99
Learn TensorFlow 2.0

Learn TensorFlow 2.0

$34.99
Outer Magnetospheric Boundaries: Cluster Results

Outer Magnetospheric Boundaries: Cluster Results

$169.99
What Political Science Can Learn from the Humanities

What Political Science Can Learn from the Humanities

$109.00
Multiwavelength Mapping of Galaxy Formation and Evolution

Multiwavelength Mapping of Galaxy Formation and Evolution

$84.99
Trauma Induced Coagulopathy

Trauma Induced Coagulopathy

$249.99
Bis(s) ins Innere des Protons

Bis(s) ins Innere des Protons

$19.99
Agricultural Proteomics Volume 1

Agricultural Proteomics Volume 1

$169.99
Mit Planungsinseln zur lernenden Organisation

Mit Planungsinseln zur lernenden Organisation

$34.99
Judicial Protection in the European Communities

Judicial Protection in the European Communities

$54.99
Morpho-Lexical Alternation in Noun Formation

Morpho-Lexical Alternation in Noun Formation

$54.99
Phonics Chapter Book - Level 2: The Internet

Phonics Chapter Book - Level 2: The Internet

$6.74
Introduction to the Finite Element Method in Electromagnetics

Introduction to the Finite Element Method in Electromagnetics

$29.99
Handbook of Accessible Achievement Tests for All Students

Handbook of Accessible Achievement Tests for All Students

$39.99
Silencing Cinema

Silencing Cinema

$54.99
Algorithms and Programming

Algorithms and Programming

$69.99
Understanding and Interpreting Machine Learning in Medical Image Computing Applications

Understanding and Interpreting Machine Learning in Medical Image Computing Applications

$54.99
Das Management von Dilemmata

Das Management von Dilemmata

$49.99
Allgemeine Rechtslehre

Allgemeine Rechtslehre

$69.99
Bildung jenseits pdagogischer Theoriebildung?

Bildung jenseits pdagogischer Theoriebildung?

$69.99
A Conceptual Framework for Noise Reduction

A Conceptual Framework for Noise Reduction

$54.99
Incineration of Radioactive Waste

Incineration of Radioactive Waste

$169.99
Bildverarbeitung fr die Medizin 2017

Bildverarbeitung fr die Medizin 2017

$74.99
Rocky Mountain (A True Book: National Parks)

Rocky Mountain (A True Book: National Parks)

$23.25
previous
next