logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Secure Edge Computing Applications Techniques And Challenges 1st Edition Mohiuddin Ahmed

  • SKU: BELL-33160666
Secure Edge Computing Applications Techniques And Challenges 1st Edition Mohiuddin Ahmed
$ 31.00 $ 45.00 (-31%)

4.3

38 reviews

Secure Edge Computing Applications Techniques And Challenges 1st Edition Mohiuddin Ahmed instant download after payment.

Publisher: CRC Press
File Extension: PDF
File size: 19.85 MB
Pages: 304
Author: Mohiuddin Ahmed, Paul Haskell-Dowland
ISBN: 9780367464141, 0367464144
Language: English
Year: 2021
Edition: 1

Product desciption

Secure Edge Computing Applications Techniques And Challenges 1st Edition Mohiuddin Ahmed by Mohiuddin Ahmed, Paul Haskell-dowland 9780367464141, 0367464144 instant download after payment.

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept to address the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. The increased connectivity and devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when it is most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need of collaborative work throughout the entire value chain of the network. In this context, this book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. In addition, the book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Related Products