248,03 €
275,59 €
-10% with code: EXTRA
Authentication Technologies for Cloud Computing, Iot and Big Data
Authentication Technologies for Cloud Computing, Iot and Big Data
248,03
275,59 €
  • We will send in 10–14 business days.
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algori…
  • SAVE -10% with code: EXTRA

Authentication Technologies for Cloud Computing, Iot and Big Data (e-book) (used book) | bookbook.eu

Reviews

Description

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

EXTRA 10 % discount with code: EXTRA

248,03
275,59 €
We will send in 10–14 business days.

The promotion ends in 19d.13:41:46

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 2,76 Book Euros!?

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)