000 03640cam a2200541Mi 4500
001 9781003028635
003 FlBoTFG
005 20220711212051.0
006 m o d
007 cr cnu---unuuu
008 210702s2021 xx o 0|| 0 eng d
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781000427325
_q(electronic bk.)
020 _a1000427323
_q(electronic bk.)
020 _a9781000427318
_q(electronic bk.)
020 _a1000427315
_q(electronic bk.)
020 _a9781003028635
_q(ebook)
020 _a1003028632
020 _z0367464144
020 _z9780367464141
024 8 _a10.1201/9781003028635
035 _a(OCoLC)1258656911
035 _a(OCoLC-P)1258656911
050 4 _aQA76.583
_b.S43 2021
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043000
_2bisacsh
072 7 _aUTR
_2bicssc
082 0 4 _a005.758
_223
245 0 0 _aSecure edge computing :
_bapplications, techniques and challenges.
260 _a[S.l.] :
_bCRC Press,
_c2021.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aThe internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. Thisincreased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system's vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked whenthey aremost needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear needfor collaborative work throughout the entire value chain of the network. In this context, this bookaddresses the cyber security challenges associated with edge computing, whichprovides a bigger pictureof the concepts, techniques, applications, and open research directions in this area. In addition, the bookserves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aEdge computing.
_99742
650 0 _aComputer security.
_93970
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
_912816
650 7 _aCOMPUTERS / Internet / Security
_2bisacsh
_912817
650 7 _aCOMPUTERS / Networking / General
_2bisacsh
_98506
700 1 _aAhmed, Mohiuddin
_c(Computer scientist),
_eeditor.
_912818
700 1 _aDowland, Paul,
_eeditor.
_912819
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003028635
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c70300
_d70300