Book description
Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details-making them unsuitable to R&D people. To fill such a need, Big Data: Storage, Sharing, and Security examines Big Data management from an R&D perspective. It covers the 3S desi
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Preface
- Editor
- Contributor
-
Section I: Big data management: Storage, Sharing, and Processing
- 1. Challenges and Approaches in Spatial Big Data Management (1/3)
- 1. Challenges and Approaches in Spatial Big Data Management (2/3)
- 1. Challenges and Approaches in Spatial Big Data Management (3/3)
- 2. Storage and Database Management for Big Data (1/6)
- 2. Storage and Database Management for Big Data (2/6)
- 2. Storage and Database Management for Big Data (3/6)
- 2. Storage and Database Management for Big Data (4/6)
- 2. Storage and Database Management for Big Data (5/6)
- 2. Storage and Database Management for Big Data (6/6)
- 3. Performance Evaluation of Protocols for Big Data Transfers (1/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (2/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (3/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (4/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (5/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (6/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (7/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (8/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (9/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (10/11)
- 3. Performance Evaluation of Protocols for Big Data Transfers (11/11)
- 4. Challenges in Crawling the Deep Web (1/5)
- 4. Challenges in Crawling the Deep Web (2/5)
- 4. Challenges in Crawling the Deep Web (3/5)
- 4. Challenges in Crawling the Deep Web (4/5)
- 4. Challenges in Crawling the Deep Web (5/5)
- 5. Big Data and Information Distillation in Social Sensing (1/5)
- 5. Big Data and Information Distillation in Social Sensing (2/5)
- 5. Big Data and Information Distillation in Social Sensing (3/5)
- 5. Big Data and Information Distillation in Social Sensing (4/5)
- 5. Big Data and Information Distillation in Social Sensing (5/5)
- 6. Big Data and the SP Theory of Intelligence (1/6)
- 6. Big Data and the SP Theory of Intelligence (2/6)
- 6. Big Data and the SP Theory of Intelligence (3/6)
- 6. Big Data and the SP Theory of Intelligence (4/6)
- 6. Big Data and the SP Theory of Intelligence (5/6)
- 6. Big Data and the SP Theory of Intelligence (6/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (1/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (2/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (3/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (4/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (5/6)
- 7. A Qualitatively Different Principle for the Organization of Big Data Processing (6/6)
-
Section II: Big Data Security: Security, Privacy, and Accountability
- 8. Integration with Cloud Computing Security (1/6)
- 8. Integration with Cloud Computing Security (2/6)
- 8. Integration with Cloud Computing Security (3/6)
- 8. Integration with Cloud Computing Security (4/6)
- 8. Integration with Cloud Computing Security (5/6)
- 8. Integration with Cloud Computing Security (6/6)
- 9. Toward Reliable and Secure Data Access for Big Data Service (1/3)
- 9. Toward Reliable and Secure Data Access for Big Data Service (2/3)
- 9. Toward Reliable and Secure Data Access for Big Data Service (3/3)
- 10. Cryptography for Big Data Security (1/10)
- 10. Cryptography for Big Data Security (2/10)
- 10. Cryptography for Big Data Security (3/10)
- 10. Cryptography for Big Data Security (4/10)
- 10. Cryptography for Big Data Security (5/10)
- 10. Cryptography for Big Data Security (6/10)
- 10. Cryptography for Big Data Security (7/10)
- 10. Cryptography for Big Data Security (8/10)
- 10. Cryptography for Big Data Security (9/10)
- 10. Cryptography for Big Data Security (10/10)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (1/3)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (2/3)
- 11. Some Issues of Privacy in a World of Big Data and Data Mining (3/3)
- 12. Privacy in Big Data (1/5)
- 12. Privacy in Big Data (2/5)
- 12. Privacy in Big Data (3/5)
- 12. Privacy in Big Data (4/5)
- 12. Privacy in Big Data (5/5)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (1/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (2/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (3/4)
- 13. Privacy and Integrity of Outsourced Data Storage and Processing (4/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (1/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (2/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (3/4)
- 14. Privacy and Accountability Concerns in the Age of Big Data (4/4)
- 15. Secure Outsourcing of Data Analysis (1/4)
- 15. Secure Outsourcing of Data Analysis (2/4)
- 15. Secure Outsourcing of Data Analysis (3/4)
- 15. Secure Outsourcing of Data Analysis (4/4)
- 16. Composite Big Data Modeling for Security Analytics (1/5)
- 16. Composite Big Data Modeling for Security Analytics (2/5)
- 16. Composite Big Data Modeling for Security Analytics (3/5)
- 16. Composite Big Data Modeling for Security Analytics (4/5)
- 16. Composite Big Data Modeling for Security Analytics (5/5)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (1/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (2/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (3/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (4/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (5/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (6/7)
- 17. Exploring the Potential of Big Data for Malware Detection and Mitigation Techniques in the Android Environment (7/7)
- Back Cover
Product information
- Title: Big Data
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781498734875
You might also like
book
Tidy First?
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up …
book
Modern Software Engineering: Doing What Works to Build Better Software Faster
Improve Your Creativity, Effectiveness, and Ultimately, Your Code In Modern Software Engineering, continuous delivery pioneer David …
book
Deciphering Data Architectures
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern …
book
Hands-On Healthcare Data
Healthcare is the next frontier for data science. Using the latest in machine learning, deep learning, …