Big Data

Book description


Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details-making them unsuitable to R&D people. To fill such a need, Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S desi

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. Preface
  5. Editor
  6. Contributor
  7. Section I: Big data management: Storage, Sharing, and Processing
    1. 1. Challenges and Approaches in Spatial Big Data Management (1/3)
    2. 1. Challenges and Approaches in Spatial Big Data Management (2/3)
    3. 1. Challenges and Approaches in Spatial Big Data Management (3/3)
    4. 2. Storage and Database Management for Big Data (1/6)
    5. 2. Storage and Database Management for Big Data (2/6)
    6. 2. Storage and Database Management for Big Data (3/6)
    7. 2. Storage and Database Management for Big Data (4/6)
    8. 2. Storage and Database Management for Big Data (5/6)
    9. 2. Storage and Database Management for Big Data (6/6)
    10. 3. Performance Evaluation of Protocols for Big Data Transfers (1/11)
    11. 3. Performance Evaluation of Protocols for Big Data Transfers (2/11)
    12. 3. Performance Evaluation of Protocols for Big Data Transfers (3/11)
    13. 3. Performance Evaluation of Protocols for Big Data Transfers (4/11)
    14. 3. Performance Evaluation of Protocols for Big Data Transfers (5/11)
    15. 3. Performance Evaluation of Protocols for Big Data Transfers (6/11)
    16. 3. Performance Evaluation of Protocols for Big Data Transfers (7/11)
    17. 3. Performance Evaluation of Protocols for Big Data Transfers (8/11)
    18. 3. Performance Evaluation of Protocols for Big Data Transfers (9/11)
    19. 3. Performance Evaluation of Protocols for Big Data Transfers (10/11)
    20. 3. Performance Evaluation of Protocols for Big Data Transfers (11/11)
    21. 4. Challenges in Crawling the Deep Web (1/5)
    22. 4. Challenges in Crawling the Deep Web (2/5)
    23. 4. Challenges in Crawling the Deep Web (3/5)
    24. 4. Challenges in Crawling the Deep Web (4/5)
    25. 4. Challenges in Crawling the Deep Web (5/5)
    26. 5. Big Data and Information Distillation in Social Sensing (1/5)
    27. 5. Big Data and Information Distillation in Social Sensing (2/5)
    28. 5. Big Data and Information Distillation in Social Sensing (3/5)
    29. 5. Big Data and Information Distillation in Social Sensing (4/5)
    30. 5. Big Data and Information Distillation in Social Sensing (5/5)
    31. 6. Big Data and the SP Theory of Intelligence (1/6)
    32. 6. Big Data and the SP Theory of Intelligence (2/6)
    33. 6. Big Data and the SP Theory of Intelligence (3/6)
    34. 6. Big Data and the SP Theory of Intelligence (4/6)
    35. 6. Big Data and the SP Theory of Intelligence (5/6)
    36. 6. Big Data and the SP Theory of Intelligence (6/6)
    37. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (1/6)
    38. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (2/6)
    39. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (3/6)
    40. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (4/6)
    41. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (5/6)
    42. 7. A Qualitatively Different Principle for the Organization of Big Data Processing (6/6)
  8. Section II: Big Data Security: Security, Privacy, and Accountability
    1. 8. Integration with Cloud Computing Security (1/6)
    2. 8. Integration with Cloud Computing Security (2/6)
    3. 8. Integration with Cloud Computing Security (3/6)
    4. 8. Integration with Cloud Computing Security (4/6)
    5. 8. Integration with Cloud Computing Security (5/6)
    6. 8. Integration with Cloud Computing Security (6/6)
    7. 9. Toward Reliable and Secure Data Access for Big Data Service (1/3)
    8. 9. Toward Reliable and Secure Data Access for Big Data Service (2/3)
    9. 9. Toward Reliable and Secure Data Access for Big Data Service (3/3)
    10. 10. Cryptography for Big Data Security (1/10)
    11. 10. Cryptography for Big Data Security (2/10)
    12. 10. Cryptography for Big Data Security (3/10)
    13. 10. Cryptography for Big Data Security (4/10)
    14. 10. Cryptography for Big Data Security (5/10)
    15. 10. Cryptography for Big Data Security (6/10)
    16. 10. Cryptography for Big Data Security (7/10)
    17. 10. Cryptography for Big Data Security (8/10)
    18. 10. Cryptography for Big Data Security (9/10)
    19. 10. Cryptography for Big Data Security (10/10)
    20. 11. Some Issues of Privacy in a World of Big Data and Data Mining (1/3)
    21. 11. Some Issues of Privacy in a World of Big Data and Data Mining (2/3)
    22. 11. Some Issues of Privacy in a World of Big Data and Data Mining (3/3)
    23. 12. Privacy in Big Data (1/5)
    24. 12. Privacy in Big Data (2/5)
    25. 12. Privacy in Big Data (3/5)
    26. 12. Privacy in Big Data (4/5)
    27. 12. Privacy in Big Data (5/5)
    28. 13. Privacy and Integrity of Outsourced Data Storage and Processing (1/4)
    29. 13. Privacy and Integrity of Outsourced Data Storage and Processing (2/4)
    30. 13. Privacy and Integrity of Outsourced Data Storage and Processing (3/4)
    31. 13. Privacy and Integrity of Outsourced Data Storage and Processing (4/4)
    32. 14. Privacy and Accountability Concerns in the Age of Big Data (1/4)
    33. 14. Privacy and Accountability Concerns in the Age of Big Data (2/4)
    34. 14. Privacy and Accountability Concerns in the Age of Big Data (3/4)
    35. 14. Privacy and Accountability Concerns in the Age of Big Data (4/4)
    36. 15. Secure Outsourcing of Data Analysis (1/4)
    37. 15. Secure Outsourcing of Data Analysis (2/4)
    38. 15. Secure Outsourcing of Data Analysis (3/4)
    39. 15. Secure Outsourcing of Data Analysis (4/4)
    40. 16. Composite Big Data Modeling for Security Analytics (1/5)
    41. 16. Composite Big Data Modeling for Security Analytics (2/5)
    42. 16. Composite Big Data Modeling for Security Analytics (3/5)
    43. 16. Composite Big Data Modeling for Security Analytics (4/5)
    44. 16. Composite Big Data Modeling for Security Analytics (5/5)
    45. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (1/7)
    46. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (2/7)
    47. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (3/7)
    48. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (4/7)
    49. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (5/7)
    50. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (6/7)
    51. 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (7/7)
  9. Back Cover

Product information

  • Title: Big Data
  • Author(s): Fei Hu
  • Release date: April 2016
  • Publisher(s): Auerbach Publications
  • ISBN: 9781498734875