Book description
Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S designs-storage, sharing, and security-through detailed descriptions of Big Data concepts and implementations. Presenting the contributions of recognized Big Data experts from around the world, the book contains more than 450 pages of technical details on the most important implementation aspects regarding Big Data.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Preface
- Editor
- Contributor
-
Section I: Big data management: Storage, Sharing, and Processing
- 1. Challenges and Approaches in Spatial Big Data Management (1/3)
- 1. Challenges and Approaches in Spatial Big Data Management (2/3)
- 1. Challenges and Approaches in Spatial Big Data Management (3/3)
- 2. Storage and Database Management for Big Data (1/6)
- 2. Storage and Database Management for Big Data (2/6)
- 2. Storage and Database Management for Big Data (3/6)
- 2. Storage and Database Management for Big Data (4/6)
- 2. Storage and Database Management for Big Data (5/6)
- 2. Storage and Database Management for Big Data (6/6)
- 3. Performance Evaluation of Protocols for Big Data Transfers (1/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (2/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (3/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (4/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (5/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (6/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (7/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (8/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (9/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (10/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (11/11)
- 4. Challenges in Crawling the Deep Web (1/5)
- 4. Challenges in Crawling the Deep Web (2/5)
- 4. Challenges in Crawling the Deep Web (3/5)
- 4. Challenges in Crawling the Deep Web (4/5)
- 4. Challenges in Crawling the Deep Web (5/5)
- 5. Big Data and Information Distillation in Social Sensing (1/5)
- 5. Big Data and Information Distillation in Social Sensing (2/5)
- 5. Big Data and Information Distillation in Social Sensing (3/5)
- 5. Big Data and Information Distillation in Social Sensing (4/5)
- 5. Big Data and Information Distillation in Social Sensing (5/5)
- 6. Big Data and the SP Theory of Intelligence (1/6)
- 6. Big Data and the SP Theory of Intelligence (2/6)
- 6. Big Data and the SP Theory of Intelligence (3/6)
- 6. Big Data and the SP Theory of Intelligence (4/6)
- 6. Big Data and the SP Theory of Intelligence (5/6)
- 6. Big Data and the SP Theory of Intelligence (6/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (1/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (2/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (3/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (4/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (5/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (6/6)
-
Section II: Big Data Security: Security, Privacy, and Accountability
- 8. Integration with Cloud Computing Security (1/6)
- 8. Integration with Cloud Computing Security (2/6)
- 8. Integration with Cloud Computing Security (3/6)
- 8. Integration with Cloud Computing Security (4/6)
- 8. Integration with Cloud Computing Security (5/6)
- 8. Integration with Cloud Computing Security (6/6)
- 9. Toward Reliable and Secure Data Access for Big Data Service (1/3)
- 9. Toward Reliable and Secure Data Access for Big Data Service (2/3)
- 9. Toward Reliable and Secure Data Access for Big Data Service (3/3)
- 10. Cryptography for Big Data Security (1/10)
- 10. Cryptography for Big Data Security (2/10)
- 10. Cryptography for Big Data Security (3/10)
- 10. Cryptography for Big Data Security (4/10)
- 10. Cryptography for Big Data Security (5/10)
- 10. Cryptography for Big Data Security (6/10)
- 10. Cryptography for Big Data Security (7/10)
- 10. Cryptography for Big Data Security (8/10)
- 10. Cryptography for Big Data Security (9/10)
- 10. Cryptography for Big Data Security (10/10)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (1/3)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (2/3)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (3/3)
- 12. Privacy in Big Data (1/5)
- 12. Privacy in Big Data (2/5)
- 12. Privacy in Big Data (3/5)
- 12. Privacy in Big Data (4/5)
- 12. Privacy in Big Data (5/5)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (1/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (2/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (3/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (4/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (1/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (2/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (3/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (4/4)
- 15. Secure Outsourcing of Data Analysis (1/4)
- 15. Secure Outsourcing of Data Analysis (2/4)
- 15. Secure Outsourcing of Data Analysis (3/4)
- 15. Secure Outsourcing of Data Analysis (4/4)
- 16. Composite Big Data Modeling for Security Analytics (1/5)
- 16. Composite Big Data Modeling for Security Analytics (2/5)
- 16. Composite Big Data Modeling for Security Analytics (3/5)
- 16. Composite Big Data Modeling for Security Analytics (4/5)
- 16. Composite Big Data Modeling for Security Analytics (5/5)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (1/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (2/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (3/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (4/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (5/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (6/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (7/7)
- Back Cover
Product information
- Title: Big Data
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781498734875
You might also like
book
Big Data
Big Data teaches you to build big data systems using an architecture that takes advantage of …
book
Big Data
Manipulating and processing masses of digital data is never a purely technical activity. It requires an …
book
Big Data
Big Data: A Business and Legal Guide supplies a clear understanding of the interrelationships between Big …
book
Big Data
Convert the promise of big data into real world results There is so much buzz around …