|
|
|
|
LEADER |
03066nam a22005535i 4500 |
001 |
978-981-10-5107-4 |
003 |
DE-He213 |
005 |
20171001012529.0 |
007 |
cr nn 008mamaa |
008 |
170927s2017 si | s |||| 0|eng d |
020 |
|
|
|a 9789811051074
|9 978-981-10-5107-4
|
024 |
7 |
|
|a 10.1007/978-981-10-5107-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Gupta, P.K.
|e author.
|
245 |
1 |
0 |
|a Predictive Computing and Information Security
|h [electronic resource] /
|c by P.K. Gupta, Vipin Tyagi, S.K. Singh.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XXI, 162 p. 57 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Predictive Computing and Information Security: A Technical Review -- Predictive Computing -- Cloud Based Predictive Computing -- IoT based Predictive Computing -- Information Security -- Cloud Based Information Security -- IoT Based Information Security -- Applications of Predictive Computing -- Appendix.
|
520 |
|
|
|a This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art techniques and the design, development and innovative use of technologies for enhancing predictive computing and information security. Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing. As such, the book offers a valuable resource for graduate students and researchers interested in exploring predictive modeling techniques and architectures to solve information security, privacy and protection issues in future communication.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Information storage and retrieval.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Information Storage and Retrieval.
|
700 |
1 |
|
|a Tyagi, Vipin.
|e author.
|
700 |
1 |
|
|a Singh, S.K.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811051067
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-981-10-5107-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|