Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Handbook of Big Data and IoT Security

Best Price (Coupon Required):
Buy Handbook of Big Data and IoT Security for $134.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $149.00 - $149.00
BEST PRICE

Single Product Purchase

$134.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$149.00 $149.00

10% OFF
This deals requires coupon
$134.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783030105433
Condition
New
Product Description

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Family Life in Britain, 16501910

Family Life in Britain, 16501910

$84.99
Computer Security  ESORICS 2019

Computer Security ESORICS 2019

$54.99
Security Aspects in Information Technology

Security Aspects in Information Technology

$69.99
Digital Heritage

Digital Heritage

$39.99
Klimavorhersage und Klimavorsorge

Klimavorhersage und Klimavorsorge

$69.99
Integrative Cardiology

Integrative Cardiology

$199.99
International Perspectives on Older Adult Education

International Perspectives on Older Adult Education

$179.99
Vernetzung von Elementar- und Primarbildung

Vernetzung von Elementar- und Primarbildung

$39.99
Liquidity Risk

Liquidity Risk

$84.99
Hydrological Processes of the Danube River Basin

Hydrological Processes of the Danube River Basin

$129.00
Iterative Identification and Restoration of Images

Iterative Identification and Restoration of Images

$169.99
Ultra-low Voltage Circuit Techniques for Energy Harvesting

Ultra-low Voltage Circuit Techniques for Energy Harvesting

$79.99
Tools for High Performance Computing 2018 / 2019

Tools for High Performance Computing 2018 / 2019

$109.99
A Prescription for Psychiatry

A Prescription for Psychiatry

$109.99
The First German Philosopher

The First German Philosopher

$139.99
The Guantnamo Artwork and Testimony of Moath Al-Alwi

The Guantnamo Artwork and Testimony of Moath Al-Alwi

$22.99
Bibliothek der Mediengestaltung  Aufbauset Digitalmedien

Bibliothek der Mediengestaltung Aufbauset Digitalmedien

$69.99
Treasury of Books Grades 2-3

Treasury of Books Grades 2-3

$250.00
Quality of Life and the Millennium Challenge

Quality of Life and the Millennium Challenge

$109.99
Science, Sexuality and Sensation Novels

Science, Sexuality and Sensation Novels

$39.99
Management von Transaktionsbanken

Management von Transaktionsbanken

$39.99
Die unternehmerische Verhandlungsvertretung

Die unternehmerische Verhandlungsvertretung

$79.99
Handbook of HIV Prevention

Handbook of HIV Prevention

$129.00
Advances in Intravital Microscopy

Advances in Intravital Microscopy

$169.99
Radiolabeled Blood Elements

Radiolabeled Blood Elements

$39.99
Transitional Justice in Unified Korea

Transitional Justice in Unified Korea

$139.99
Symbolic and Algebraic Computation

Symbolic and Algebraic Computation

$44.99
Geschichte des deutschen Fernsehens

Geschichte des deutschen Fernsehens

$79.99
Betriebsverhalten von Synchronmaschinen mit unsymmetrischer Stnderwicklung

Betriebsverhalten von Synchronmaschinen mit unsymmetrischer Stnderwicklung

$44.99
Structured Light Fields

Structured Light Fields

$109.99
Dissent in the Years of Krushchev

Dissent in the Years of Krushchev

$109.99
Radiological Diagnosis of Breast Diseases

Radiological Diagnosis of Breast Diseases

$109.99
Neonatal Jaundice

Neonatal Jaundice

$109.99
Engels before Marx

Engels before Marx

$64.99
Models for Modalities

Models for Modalities

$169.99
Symbolic Computation in Software Science

Symbolic Computation in Software Science

$89.00
Multi-stage Feedback Control Design for Multi-time-scale System

Multi-stage Feedback Control Design for Multi-time-scale System

$159.99
Konstruktives Zeichnen Maschinenbau

Konstruktives Zeichnen Maschinenbau

$29.99
Light in Biology and Medicine

Light in Biology and Medicine

$39.99
Nevanlinnas Theory of Value Distribution

Nevanlinnas Theory of Value Distribution

$119.99
previous
next