Secure edge computing : (Record no. 70300)

000 -LEADER
fixed length control field 03640cam a2200541Mi 4500
001 - CONTROL NUMBER
control field 9781003028635
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212051.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210702s2021 xx o 0|| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000427325
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000427323
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000427318
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000427315
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003028635
-- (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003028632
082 04 - CLASSIFICATION NUMBER
Call Number 005.758
245 00 - TITLE STATEMENT
Title Secure edge computing :
Sub Title applications, techniques and challenges.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication [S.l.] :
Publisher CRC Press,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
520 ## - SUMMARY, ETC.
Summary, etc The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
700 1# - AUTHOR 2
Author 2 Ahmed, Mohiuddin
700 1# - AUTHOR 2
Author 2 Dowland, Paul,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003028635
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Edge computing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / Security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Internet / Security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / General

No items available.