Secure Edge Computing:Applications, Techniques and Challenges
商品資訊
ISBN13:9780367464141
出版社:PBKTYFRL
作者:Ahmed; Mohiuddin; Haskell-Dowland; Paul
出版日:2021/08/13
裝訂/頁數:精裝/304頁
規格:17.8cm*25.4cm (高/寬)
定價
:NT$ 5819 元若需訂購本書,請電洽客服 02-25006600[分機130、131]。
商品簡介
相關商品
商品簡介
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept to address the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers.
Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. The increased connectivity and devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge.
The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when it is most needed to fight cyber-crime and ensure data privacy.
Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need of collaborative work throughout the entire value chain of the network. In this context, this book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area.
In addition, the book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. The increased connectivity and devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge.
The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when it is most needed to fight cyber-crime and ensure data privacy.
Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need of collaborative work throughout the entire value chain of the network. In this context, this book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area.
In addition, the book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
主題書展
更多
主題書展
更多書展今日66折
您曾經瀏覽過的商品
購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。