Big Data

Book description


Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S designs-storage, sharing, and security-through detailed descriptions of Big Data concepts and implementations. Presenting the contributions of recognized Big Data experts from around the world, the book contains more than 450 pages of technical details on the most important implementation aspects regarding Big Data.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface
  5. Editor
  6. Contributor
  7. Section I: Big data management: Storage, Sharing, and Processing
    1. 1. Challenges and Approaches in Spatial Big Data Management (1/3)
    2. 1. Challenges and Approaches in Spatial Big Data Management (2/3)
    3. 1. Challenges and Approaches in Spatial Big Data Management (3/3)
    4. 2. Storage and Database Management for Big Data (1/6)
    5. 2. Storage and Database Management for Big Data (2/6)
    6. 2. Storage and Database Management for Big Data (3/6)
    7. 2. Storage and Database Management for Big Data (4/6)
    8. 2. Storage and Database Management for Big Data (5/6)
    9. 2. Storage and Database Management for Big Data (6/6)
    10. 3. Performance Evaluation of Protocols for Big Data Transfers (1/11)
    11. 3. Performance Evaluation of Protocols for Big Data Transfers (2/11)
    12. 3. Performance Evaluation of Protocols for Big Data Transfers (3/11)
    13. 3. Performance Evaluation of Protocols for Big Data Transfers (4/11)
    14. 3. Performance Evaluation of Protocols for Big Data Transfers (5/11)
    15. 3. Performance Evaluation of Protocols for Big Data Transfers (6/11)
    16. 3. Performance Evaluation of Protocols for Big Data Transfers (7/11)
    17. 3. Performance Evaluation of Protocols for Big Data Transfers (8/11)
    18. 3. Performance Evaluation of Protocols for Big Data Transfers (9/11)
    19. 3. Performance Evaluation of Protocols for Big Data Transfers (10/11)
    20. 3. Performance Evaluation of Protocols for Big Data Transfers (11/11)
    21. 4. Challenges in Crawling the Deep Web (1/5)
    22. 4. Challenges in Crawling the Deep Web (2/5)
    23. 4. Challenges in Crawling the Deep Web (3/5)
    24. 4. Challenges in Crawling the Deep Web (4/5)
    25. 4. Challenges in Crawling the Deep Web (5/5)
    26. 5. Big Data and Information Distillation in Social Sensing (1/5)
    27. 5. Big Data and Information Distillation in Social Sensing (2/5)
    28. 5. Big Data and Information Distillation in Social Sensing (3/5)
    29. 5. Big Data and Information Distillation in Social Sensing (4/5)
    30. 5. Big Data and Information Distillation in Social Sensing (5/5)
    31. 6. Big Data and the SP Theory of Intelligence (1/6)
    32. 6. Big Data and the SP Theory of Intelligence (2/6)
    33. 6. Big Data and the SP Theory of Intelligence (3/6)
    34. 6. Big Data and the SP Theory of Intelligence (4/6)
    35. 6. Big Data and the SP Theory of Intelligence (5/6)
    36. 6. Big Data and the SP Theory of Intelligence (6/6)
    37. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (1/6)
    38. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (2/6)
    39. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (3/6)
    40. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (4/6)
    41. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (5/6)
    42. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (6/6)
  8. Section II: Big Data Security: Security, Privacy, and Accountability
    1. 8. Integration with Cloud Computing Security (1/6)
    2. 8. Integration with Cloud Computing Security (2/6)
    3. 8. Integration with Cloud Computing Security (3/6)
    4. 8. Integration with Cloud Computing Security (4/6)
    5. 8. Integration with Cloud Computing Security (5/6)
    6. 8. Integration with Cloud Computing Security (6/6)
    7. 9. Toward Reliable and Secure Data Access for Big Data Service (1/3)
    8. 9. Toward Reliable and Secure Data Access for Big Data Service (2/3)
    9. 9. Toward Reliable and Secure Data Access for Big Data Service (3/3)
    10. 10. Cryptography for Big Data Security (1/10)
    11. 10. Cryptography for Big Data Security (2/10)
    12. 10. Cryptography for Big Data Security (3/10)
    13. 10. Cryptography for Big Data Security (4/10)
    14. 10. Cryptography for Big Data Security (5/10)
    15. 10. Cryptography for Big Data Security (6/10)
    16. 10. Cryptography for Big Data Security (7/10)
    17. 10. Cryptography for Big Data Security (8/10)
    18. 10. Cryptography for Big Data Security (9/10)
    19. 10. Cryptography for Big Data Security (10/10)
    20. 11. Some Issues of Privacy in a World of Big Data and Data Mining (1/3)
    21. 11. Some Issues of Privacy in a World of Big Data and Data Mining (2/3)
    22. 11. Some Issues of Privacy in a World of Big Data and Data Mining (3/3)
    23. 12. Privacy in Big Data (1/5)
    24. 12. Privacy in Big Data (2/5)
    25. 12. Privacy in Big Data (3/5)
    26. 12. Privacy in Big Data (4/5)
    27. 12. Privacy in Big Data (5/5)
    28. 13. Privacy and Integrity of Outsourced Data Storage and Processing (1/4)
    29. 13. Privacy and Integrity of Outsourced Data Storage and Processing (2/4)
    30. 13. Privacy and Integrity of Outsourced Data Storage and Processing (3/4)
    31. 13. Privacy and Integrity of Outsourced Data Storage and Processing (4/4)
    32. 14. Privacy and Accountability Concerns in the Age of Big Data (1/4)
    33. 14. Privacy and Accountability Concerns in the Age of Big Data (2/4)
    34. 14. Privacy and Accountability Concerns in the Age of Big Data (3/4)
    35. 14. Privacy and Accountability Concerns in the Age of Big Data (4/4)
    36. 15. Secure Outsourcing of Data Analysis (1/4)
    37. 15. Secure Outsourcing of Data Analysis (2/4)
    38. 15. Secure Outsourcing of Data Analysis (3/4)
    39. 15. Secure Outsourcing of Data Analysis (4/4)
    40. 16. Composite Big Data Modeling for Security Analytics (1/5)
    41. 16. Composite Big Data Modeling for Security Analytics (2/5)
    42. 16. Composite Big Data Modeling for Security Analytics (3/5)
    43. 16. Composite Big Data Modeling for Security Analytics (4/5)
    44. 16. Composite Big Data Modeling for Security Analytics (5/5)
    45. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (1/7)
    46. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (2/7)
    47. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (3/7)
    48. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (4/7)
    49. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (5/7)
    50. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (6/7)
    51. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (7/7)
  9. Back Cover

Product information

  • Title: Big Data
  • Author(s): Fei Hu
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781498734875