Next-Generation Systems and Secure Computing
Author: Subhabrata Barman (Editor), Santanu Koley (Editor), Subhankar Joardar (Editor) &
Publisher finelybook 出版社: Wiley-Scrivener
Edition 版本: 1st edition
Publication Date 出版日期: 2025-04-21
Language 语言: English
Print Length 页数: 480 pages
ISBN-10: 1394228260
ISBN-13: 9781394228263
Book Description
Next-Generation Systems and Secure Computing is essential for anyone looking to stay ahead in the rapidly evolving landscape of technology. It offers crucial insights into advanced computing models and their security implications, equipping readers with the knowledge needed to navigate the complex challenges of today’s digital world.
The development of technology in recent years has produced a number of scientific advancements in sectors like computer science. The advent of new computing models has been one particular development within this sector. New paradigms are always being invented, greatly expanding cloud computing technology. Fog, edge, and serverless computing are examples of these revolutionary advanced technologies. Nevertheless, these new approaches create new security difficulties and are forcing experts to reassess their current security procedures. Devices for edge computing aren’t designed with the same IT hardware protocols in mind. There are several application cases for edge computing and the Internet of Things (IoT) in remote locations. Yet, cybersecurity settings and software upgrades are commonly disregarded when it comes to preventing cybercrime and guaranteeing data privacy.
Next-Generation Systems and Secure Computing compiles cutting-edge studies on the development of cutting-edge computing technologies and their role in enhancing current security practices. The book will highlight topics like fault tolerance, federated cloud security, and serverless computing, as well as security issues surrounding edge computing in this context, offering a thorough discussion of the guiding principles, operating procedures, applications, and unexplored areas of study. Next-Generation Systems and Secure Computing is a one-stop resource for learning about the technology, procedures, and individuals involved in next-generation security and computing.
From the Back Cover
Next-Generation Systems and Secure Computing is essential for anyone looking to stay ahead in the rapidly evolving landscape of technology. It offers crucial insights into advanced computing models and their security implications, equipping readers with the knowledge needed to navigate the complex challenges of today’s digital world.
The development of technology in recent years has produced a number of scientific advancements in sectors like computer science. The advent of new computing models has been one particular development within this sector. New paradigms are always being invented, greatly expanding cloud computing technology. Fog, edge, and serverless computing are examples of these revolutionary advanced technologies. Nevertheless, these new approaches create new security difficulties and are forcing experts to reassess their current security procedures. Devices for edge computing aren’t designed with the same IT hardware protocols in mind. There are several application cases for edge computing and the Internet of Things (IoT) in remote locations. Yet, cybersecurity settings and software upgrades are commonly disregarded when it comes to preventing cybercrime and guaranteeing data privacy.
Next-Generation Systems and Secure Computing compiles cutting-edge studies on the development of cutting-edge computing technologies and their role in enhancing current security practices. The book will highlight topics like fault tolerance, federated cloud security, and serverless computing, as well as security issues surrounding edge computing in this context, offering a thorough discussion of the guiding principles, operating procedures, applications, and unexplored areas of study. Next-Generation Systems and Secure Computing is a one-stop resource for learning about the technology, procedures, and individuals involved in next-generation security and computing.
About the Author
Subhabrata Barman is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, West Bengal, India, with over 19 years of teaching and research experience. He has edited a number of internationally published books and journals. Additionally, he is a professional member of the Computer Society of India, the Institute for Electrical and Electronics Engineers, the International Association of Computer Science and Information Technology, and the International Association of Engineers. His research interests include wireless networks, computational intelligence, remote sensing and geoinformatics, precision agriculture, and parallel and grid computing.
Santanu Koley, PhD, is a professor in the Computer Science and Engineering Department at Haldia Institute of Technology, West Bengal, India, with more than 19 years of teaching experience and more than eighteen years of research experience. He has published over 50 research publications in numerous national and international journals, conferences, books, and book chapters. His main areas of research include machine learning, cloud computing, digital image processing, and artificial intelligence.
Subhankar Joardar, PhD, is a professor and head of the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He has published over 20 technical papers in referred journals and conferences. Additionally, he has served as an organizing chair and program committee member for several international conferences and is a member of the Computer Society of India. His current research interests include swarm intelligence, routing in mobile ad hoc networks, and machine learning.
下载地址
相关推荐
Mastering UltraEdit: Functions and Possibilities of the Most Flexible, Powerful, and Secure Text Editor
Ultimate Microsoft Intune for Administrators: Master Enterprise Endpoint Security and Manage Devices, Apps, and Cloud Security with Expert Microsoft Intune Strategies
R for the Rest of Us: A Statistics-Free Introduction
Post-Apocalyptic Computing
Differential Privacy
Abstract Dynamic Programming,2nd Edition
评论 抢沙发
觉得文章有用就打赏一下
您的打赏,我们将继续给力更多优质内容
支付宝扫一扫

微信扫一扫
