Breaking News!
Up to 30% Off Nike Footwear

Handbook of Big Data and IoT Security

Best Price (Coupon Required):
Buy Handbook of Big Data and IoT Security for $134.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $149.00 - $149.00
BEST PRICE

Single Product Purchase

$134.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$149.00 $149.00

10% OFF
This deals requires coupon
$134.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783030105433
Condition
New
Product Description

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Merkmale und Reprsentationen

Merkmale und Reprsentationen

$69.99
Essentials of Water Systems Design in the Oil, Gas, and Chemical Processing Industries

Essentials of Water Systems Design in the Oil, Gas, and Chemical Processing Industries

$54.99
The Nature of the Beast (Chief Inspector Gamache Series #11) by Louise Penny

The Nature of the Beast (Chief Inspector Gamache Series #11) by Louise Penny

$19.00
Shi'i Jurisprudence and Constitution

Shi'i Jurisprudence and Constitution

$109.99
Where The Crawdads Sing by Delia Owens

Where The Crawdads Sing by Delia Owens

$28.00
Pluralism and Law

Pluralism and Law

$109.99
Prospects for Alternative Energy Development in the U.S. West

Prospects for Alternative Energy Development in the U.S. West

$109.99
Mechanical damage and crack growth in concrete

Mechanical damage and crack growth in concrete

$219.99
Economics of Natural Resources and the Environment

Economics of Natural Resources and the Environment

$169.99
Hardware-Software Co-Design of Embedded Systems

Hardware-Software Co-Design of Embedded Systems

$169.99
Transport Properties of Molecular Junctions

Transport Properties of Molecular Junctions

$169.99
Social Tragedy

Social Tragedy

$39.99
Adaptation and Evolution in Marine Environments, Volume 1

Adaptation and Evolution in Marine Environments, Volume 1

$109.99
Public Policies for Human Development

Public Policies for Human Development

$84.99
Optimal Control of a Double Integrator

Optimal Control of a Double Integrator

$54.99
Endoscopy of the Paranasal Sinuses

Endoscopy of the Paranasal Sinuses

$109.99
Nanotechnology Past and Present

Nanotechnology Past and Present

$27.99
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications

Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications

$84.99
Advances in Information and Communication

Advances in Information and Communication

$219.99
Rupturing African Philosophy on Teaching and Learning

Rupturing African Philosophy on Teaching and Learning

$109.99
Dignaga on the Interpretation of Signs

Dignaga on the Interpretation of Signs

$169.00
Formale Modelle fr Informationssysteme

Formale Modelle fr Informationssysteme

$69.99
Rotational Isomeric State Models in Macromolecular Systems

Rotational Isomeric State Models in Macromolecular Systems

$259.00
Distributed Platforms

Distributed Platforms

$169.00
High Performance Computing for Computational Science - VECPAR 2002

High Performance Computing for Computational Science - VECPAR 2002

$84.99
Prfung und Verarbeitung von Arzneidrogen

Prfung und Verarbeitung von Arzneidrogen

$59.99
Theory and Computation of Complex Tensors and its Applications

Theory and Computation of Complex Tensors and its Applications

$129.99
Latin Americas Pendular Politics

Latin Americas Pendular Politics

$139.99
OpenSHMEM and Related Technologies. Experiences, Implementations, and Technologies

OpenSHMEM and Related Technologies. Experiences, Implementations, and Technologies

$34.99
The Concept of Coherence in Art

The Concept of Coherence in Art

$39.99
Innengerichtete Markenfhrung in Unternehmen mit mehreren Marken

Innengerichtete Markenfhrung in Unternehmen mit mehreren Marken

$69.99
Innengerichtetes identittsbasiertes Markenmanagement

Innengerichtetes identittsbasiertes Markenmanagement

$69.99
Current Trends in Immunity and Respiratory Infections

Current Trends in Immunity and Respiratory Infections

$159.99
Trust Management in the Chinese E-Commerce Market

Trust Management in the Chinese E-Commerce Market

$119.00
Lectures on Classical and Quantum Theory of Fields

Lectures on Classical and Quantum Theory of Fields

$89.99
Python Continuous Integration and Delivery

Python Continuous Integration and Delivery

$54.99
Analytische Psychosentherapie

Analytische Psychosentherapie

$44.99
Mathematical and Computational Methods for Modelling, Approximation and Simulation

Mathematical and Computational Methods for Modelling, Approximation and Simulation

$179.99
What Do Children Need to Flourish?

What Do Children Need to Flourish?

$169.99
Social Learning and Innovation in Contemporary Hunter-Gatherers

Social Learning and Innovation in Contemporary Hunter-Gatherers

$139.99
previous
next