Part I

Supporting Technologies for BDMA and BDSP

Introduction to Part I

Before we discuss the big data management and analytics (BDMA) and big data security and privacy (BDSP) systems that we have designed and developed in Parts II through IV, we need to provide some of the technologies that are needed for an understanding of our systems. Part I will provide an overview of such technologies.

Part I, consisting of six chapters, will describe supporting technologies for BDMA and BDSP. Chapter 2 will describe security technologies. In particular, we will discuss various aspects of data security and privacy. In Chapter 3, we provide some background information about general data mining techniques so that the reader can have an understanding of ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.