Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management

Nonfiction, Computers, Advanced Computing, Information Technology, General Computing
Cover of the book Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522540465
Publisher: IGI Global Publication: June 29, 2018
Imprint: Engineering Science Reference Language: English
Author:
ISBN: 9781522540465
Publisher: IGI Global
Publication: June 29, 2018
Imprint: Engineering Science Reference
Language: English

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity. Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.

More books from IGI Global

Cover of the book Geographic Information Analysis for Sustainable Development and Economic Planning by
Cover of the book Gaze Interaction and Applications of Eye Tracking by
Cover of the book Managing Knowledge Resources and Records in Modern Organizations by
Cover of the book Handbook of Research on Classroom Diversity and Inclusive Education Practice by
Cover of the book Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning by
Cover of the book Emerging Theory and Practice in Neuroprosthetics by
Cover of the book Marketing Decision Making and the Management of Pricing by
Cover of the book Ontology Learning and Knowledge Discovery Using the Web by
Cover of the book User Perception and Influencing Factors of Technology in Everyday Life by
Cover of the book Handbook of Research on Technology Integration in the Global World by
Cover of the book Strategic Collaborative Innovations in Organizational Systems by
Cover of the book Collaborative Models for Librarian and Teacher Partnerships by
Cover of the book Global Cyber Security Labor Shortage and International Business Risk by
Cover of the book Medical Applications of Intelligent Data Analysis by
Cover of the book Resource Management of Mobile Cloud Computing Networks and Environments by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy