Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Handbook of Big Data and IoT Security

Best Price (Coupon Required):
Buy Handbook of Big Data and IoT Security for $134.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $149.00 - $149.00
BEST PRICE

Single Product Purchase

$134.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$149.00 $149.00

10% OFF
This deals requires coupon
$134.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783030105433
Condition
New
Product Description

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Holgazn

Holgazn

$5.24
Taking Up Space (Hardcover)

Taking Up Space (Hardcover)

$13.49
Post-Investment Value Addition to Buyouts

Post-Investment Value Addition to Buyouts

$54.99
Aktuelle Neuropdiatrie 1990

Aktuelle Neuropdiatrie 1990

$54.99
Advanced Research in Technologies, Information, Innovation and Sustainability

Advanced Research in Technologies, Information, Innovation and Sustainability

$139.99
Learning Abstract Algebra with ISETL

Learning Abstract Algebra with ISETL

$54.99
Mimicked Tissue Engineering Scaffolds for Maxillofacial and Articular Cartilage Surgery

Mimicked Tissue Engineering Scaffolds for Maxillofacial and Articular Cartilage Surgery

$169.99
Nach Foucault

Nach Foucault

$64.99
Ecological Genetics and Air Pollution

Ecological Genetics and Air Pollution

$39.99
Die steuerliche Haftung des GmbH-Geschftsfhrers

Die steuerliche Haftung des GmbH-Geschftsfhrers

$59.99
Particle Accelerator Physics I

Particle Accelerator Physics I

$59.99
Kate Chopin, Edith Wharton and Charlotte Perkins Gilman

Kate Chopin, Edith Wharton and Charlotte Perkins Gilman

$109.99
Electrochemical Sensors in Immunological Analysis

Electrochemical Sensors in Immunological Analysis

$219.99
Ethisches Marketing in Psychologie und Psychotherapie

Ethisches Marketing in Psychologie und Psychotherapie

$49.99
Unternehmenserweiterung

Unternehmenserweiterung

$69.99
Die Bewertung zuknftiger Unternehmenserfolge

Die Bewertung zuknftiger Unternehmenserfolge

$79.99
Functional Integrals

Functional Integrals

$109.99
Convergence or Divergence in Europe?

Convergence or Divergence in Europe?

$109.99
Local Democracy and Politics in South Asia

Local Democracy and Politics in South Asia

$59.99
Der AMAZONAS

Der AMAZONAS

$44.99
Die Gliederung der Datenverarbeitungsstelle und ihre Einordnung in die Organisation der Unternehmung

Die Gliederung der Datenverarbeitungsstelle und ihre Einordnung in die Organisation der Unternehmung

$59.99
Physiological Function in Special Environments

Physiological Function in Special Environments

$84.99
Advances in Cryptology - CRYPTO 2006

Advances in Cryptology - CRYPTO 2006

$54.99
Ambidextrie und Unternehmenserfolg bei einem diskontinuierlichen Wandel

Ambidextrie und Unternehmenserfolg bei einem diskontinuierlichen Wandel

$84.99
Atlantic Politics, Military Strategy and the French and Indian War

Atlantic Politics, Military Strategy and the French and Indian War

$19.99
Sustainability of Irrigated Agriculture

Sustainability of Irrigated Agriculture

$329.99
Broadband Wireless Communications for Railway Applications

Broadband Wireless Communications for Railway Applications

$109.99
India's Economic Growth

India's Economic Growth

$109.99
Major Histocompatibility Complex

Major Histocompatibility Complex

$109.99
Taxation, Politics, and Protest in Ireland, 16622016

Taxation, Politics, and Protest in Ireland, 16622016

$179.99
Hersteller- und Handelsmarken im Kaufentscheidungsprozess

Hersteller- und Handelsmarken im Kaufentscheidungsprozess

$74.99
Facial Bone Contouring Surgery

Facial Bone Contouring Surgery

$79.99
Recent Themes in the Philosophy of Science

Recent Themes in the Philosophy of Science

$109.99
Energy Technology 2024

Energy Technology 2024

$169.00
Software Process and Product Measurement

Software Process and Product Measurement

$39.99
Contract Research and Development Organizations

Contract Research and Development Organizations

$169.99
Numerik linearer Gleichungssysteme

Numerik linearer Gleichungssysteme

$34.99
Pharmacology and Abuse of Cocaine, Amphetamines, Ecstasy and Related Designer Drugs

Pharmacology and Abuse of Cocaine, Amphetamines, Ecstasy and Related Designer Drugs

$219.99
American National Security and Civil Liberties in an Era of Terrorism

American National Security and Civil Liberties in an Era of Terrorism

$54.99
Modeling and Optimization of Cloud-Ready and Content-Oriented Networks

Modeling and Optimization of Cloud-Ready and Content-Oriented Networks

$109.99
previous
next