Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management

Nonfiction, Computers, Advanced Computing, Information Technology, General Computing
Cover of the book Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522540465
Publisher: IGI Global Publication: June 29, 2018
Imprint: Engineering Science Reference Language: English
Author:
ISBN: 9781522540465
Publisher: IGI Global
Publication: June 29, 2018
Imprint: Engineering Science Reference
Language: English

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

More books from IGI Global

Cover of the book Gender Considerations in Online Consumption Behavior and Internet Use by
Cover of the book Pervasive Cloud Computing Technologies by
Cover of the book Exploring the Technological, Societal, and Institutional Dimensions of College Student Activism by
Cover of the book Projective Processes and Neuroscience in Art and Design by
Cover of the book Microfinance and Its Impact on Entrepreneurial Development, Sustainability, and Inclusive Growth by
Cover of the book Innovative Strategies and Approaches for End-User Computing Advancements by
Cover of the book Cases on Strategic Social Media Utilization in the Nonprofit Sector by
Cover of the book Applied Artificial Higher Order Neural Networks for Control and Recognition by
Cover of the book Multi-Core Computer Vision and Image Processing for Intelligent Applications by
Cover of the book Sustainable Nanosystems Development, Properties, and Applications by
Cover of the book Handbook of Research on Retailer-Consumer Relationship Development by
Cover of the book Digital Rights Management by
Cover of the book Mobile and Handheld Computing Solutions for Organizations and End-Users by
Cover of the book Handbook of Research on Supply Chain Management for Sustainable Development by
Cover of the book Cognitive Radio and Interference Management by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy