logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Predictive Data Security Using Ai Insights And Issues Of Blockchain Iot And Devops Hiren Kumar Thakkar

  • SKU: BELL-48692544
Predictive Data Security Using Ai Insights And Issues Of Blockchain Iot And Devops Hiren Kumar Thakkar
$ 31.00 $ 45.00 (-31%)

4.0

76 reviews

Predictive Data Security Using Ai Insights And Issues Of Blockchain Iot And Devops Hiren Kumar Thakkar instant download after payment.

Publisher: Springer
File Extension: PDF
File size: 4.47 MB
Pages: 221
Author: Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria, (eds.)
ISBN: 9789811962899, 9811962898
Language: English
Year: 2022

Product desciption

Predictive Data Security Using Ai Insights And Issues Of Blockchain Iot And Devops Hiren Kumar Thakkar by Hiren Kumar Thakkar, Mayank Swarnkar, Robin Singh Bhadoria, (eds.) 9789811962899, 9811962898 instant download after payment.

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.

Related Products