• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps

ISBN-13: 9789811962899 / Angielski / Twarda / 2022 / 216 str.

Hiren Kumar Thakkar; Mayank Swarnkar; Robin Singh Bhadoria
Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps Hiren Kumar Thakkar Mayank Swarnkar Robin Singh Bhadoria 9789811962899 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Predictive Data Security using AI: Insights and Issues of Blockchain, IoT, and DevOps

ISBN-13: 9789811962899 / Angielski / Twarda / 2022 / 216 str.

Hiren Kumar Thakkar; Mayank Swarnkar; Robin Singh Bhadoria
cena 644,07
(netto: 613,40 VAT:  5%)

Najniższa cena z 30 dni: 578,30
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
inne wydania

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Technology & Engineering > Electrical
Computers > Artificial Intelligence - General
Wydawca:
Springer
Seria wydawnicza:
Studies in Computational Intelligence
Język:
Angielski
ISBN-13:
9789811962899
Rok wydania:
2022
Dostępne języki:
Numer serii:
000318395
Ilość stron:
216
Oprawa:
Twarda

Introduction to Data Security with Machine Learning: Traditional Methods vs Recent Trends.- Data Security and Predictive Informatics: Issues, Challenges, and Opportunities.- Data Security Analytics using Machine Learning: Supervised and Unsupervised Approaches.- Data Security in Data Servers: Implementation of Security in Data Servers, Content Delivery Network Servers and Proxy Servers.- Data Security in Multimedia using AI: Perspective and Practices.- Data Security in Blockchain: Data Generation, Analysis and Predictions.

Dr. Hiren Kumar Thakkar received his M.Tech in Computer Science and Engineering from IIIT Bhubaneswar, India, in 2012 and a Ph.D. degree from Chang Gung University, Taiwan, in 2018. Later, he worked as a postdoctoral researcher in the Department of Occupation Therapy, Motor Behavioral Research Lab (MBRL), Chang Gung University, Taiwan. Currently, he is an Assistant Professor in the Department of Computer Science and Engineering, Pandit Deendayal Energy University, Gujarat, India. Dr. Thakkar has published several journal research papers in the areas such as optimization, machine learning, and reinforcement learning. He is a member of IEEE.

 

Dr. Mayank Swarnkar is currently an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU) Varanasi. He completed his Ph.D. from the Indian Institute of Technology Indore in 2019. He completed his M.Tech in Wireless Communication and Computing from the Indian Institute of Information Technology Allahabad Prayagraj in 2013 and B.E. in Information Technology from Jabalpur Engineering College in 2011. He joined IIT(BHU) in 2020. He also worked as Software Engineer in NEC Technologies India during 2013-2014. His primary areas of interest are network and system security. He works mainly in network traffic classification, zero-day attacks, intrusion detection systems, IoT security analysis, network protocol vulnerability analysis, and VoIP spam detection. He has several publications in international journals and conferences. He is a member of IEEE and ACM.

 

Robin Singh Bhadoria completed his Ph.D. degree from the Indian Institute of Technology Indore in January 2018. He also finished his M.Tech. and B.E. in CSE from different institutions affiliated with RGPV Bhopal in 2011 and 2008, respectively. He has been awarded the University Gold Medal for his M.Tech. Degree at Vidhan Sabha of Madhya Pradesh in 2011. He has published over 07 edited books and over 29 journal papers, and 21 peer-reviewed international conference papers. He is a member of IEEE (USA), IAENG (Hong-Kong), Internet Society, Virginia (USA), IACSIT (Singapore), and IEI (India).


This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia