Cyber Security in Parallel and Distributed Computing

Concepts, Techniques, Applications and Case Studies

Nonfiction, Computers, Database Management, Client-Server Computing
Cover of the book Cyber Security in Parallel and Distributed Computing by , Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781119488316
Publisher: Wiley Publication: March 20, 2019
Imprint: Wiley-Scrivener Language: English
Author:
ISBN: 9781119488316
Publisher: Wiley
Publication: March 20, 2019
Imprint: Wiley-Scrivener
Language: English

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.

This important book cover subjects such as:

  • Research and solutions for the problem of hidden image detection
  • Security aspects of data mining and possible solution techniques
  • A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
  • Blockchain technology and how it is crucial to the security industry
  • Security for the Internet of Things
  • Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
  • Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
  • Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
  • Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management
  • Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
  • Security issues in the healthcare sector with existing solutions and emerging threats.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.

This important book cover subjects such as:

More books from Wiley

Cover of the book Colorectal Surgery by
Cover of the book Psychological Therapies for Adults with Intellectual Disabilities by
Cover of the book 101 Ways to Save Money on Your Tax - Legally! 2014 - 2015 by
Cover of the book Counterparty Credit Risk and Credit Value Adjustment by
Cover of the book Elephants and Savanna Woodland Ecosystems by
Cover of the book Climate Wars by
Cover of the book Foundations for Microstrip Circuit Design by
Cover of the book Hygienisch-mikrobiologische Wasseruntersuchung in der Praxis by
Cover of the book Philosophy of Mind by
Cover of the book The Chemistry and Biology of Volatiles by
Cover of the book Cracking Codes and Cryptograms For Dummies by
Cover of the book Big Money, Less Risk by
Cover of the book Agents and Their Actions by
Cover of the book Mathematical Foundations of Image Processing and Analysis, Volume 2 by
Cover of the book Encouraging Authenticity and Spirituality in Higher Education by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy