Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks, wireless networks, mobile ad hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.
This bookpresents some of the emerging techniques and technologies used to handle Webdata management. The Volume will be a valuable reference toresearchers, students and practitioners in the field of Web data management,cloud computing, social networks using advanced intelligence tools.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.