logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Secure Edge Computing: Applications, Techniques and Challenges by Mohiuddin Ahmed, Paul Haskell-Dowland ISBN 9780367464141, 0367464144

  • SKU: EBN-33160666
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Secure Edge Computing: Applications, Techniques and Challenges after payment.
Authors:Mohiuddin Ahmed, Paul Haskell-Dowland
Pages:304 pages.
Year:2021
Editon:1
Publisher:CRC Press
Language:english
File Size:19.85 MB
Format:pdf
ISBNS:9780367464141, 0367464144
Categories: Ebooks

Product desciption

(Ebook) Secure Edge Computing: Applications, Techniques and Challenges by Mohiuddin Ahmed, Paul Haskell-Dowland ISBN 9780367464141, 0367464144

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept to address the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. The increased connectivity and devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when it is most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need of collaborative work throughout the entire value chain of the network. In this context, this book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. In addition, the book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products