Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management

Nonfiction, Computers, Advanced Computing, Information Technology, General Computing
Cover of the book Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522540465
Publisher: IGI Global Publication: June 29, 2018
Imprint: Engineering Science Reference Language: English
Author:
ISBN: 9781522540465
Publisher: IGI Global
Publication: June 29, 2018
Imprint: Engineering Science Reference
Language: English

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

More books from IGI Global

Cover of the book Handbook of Research on Effective Project Management through the Integration of Knowledge and Innovation by
Cover of the book Advancing Information Management through Semantic Web Concepts and Ontologies by
Cover of the book Handbook of Research on Big Data and the IoT by
Cover of the book Integrated Marketing Communications, Strategies, and Tactical Operations in Sports Organizations by
Cover of the book Decentralized Computing Using Blockchain Technologies and Smart Contracts by
Cover of the book Cases on 3D Technology Application and Integration in Education by
Cover of the book Mobile and Blended Learning Innovations for Improved Learning Outcomes by
Cover of the book Knowledge Engineering for Software Development Life Cycles by
Cover of the book Educational Technology and Resources for Synchronous Learning in Higher Education by
Cover of the book Collaboration and Student Engagement in Design Education by
Cover of the book Enhancing Software Fault Prediction With Machine Learning by
Cover of the book Developing Churn Models Using Data Mining Techniques and Social Network Analysis by
Cover of the book Digital Forensics for the Health Sciences by
Cover of the book Boundedness and Self-Organized Semantics: Theory and Applications by
Cover of the book Security, Design, and Architecture for Broadband and Wireless Network Technologies by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy