| 000 | 01603naaaa2200349uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/34730 | ||
| 005 | 20220219185501.0 | ||
| 020 | _a/doi.org/10.1515/9783110606058 | ||
| 024 | 7 |
_ahttps://doi.org/10.1515/9783110606058 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aUNF _2bicssc |
|
| 100 | 1 |
_aBanarjee, Indiradip _4edt |
|
| 700 | 1 |
_aBhattacharyya, Siddhartha _4edt |
|
| 700 | 1 |
_aGuipta, Shibakali _4edt |
|
| 700 | 1 |
_aBanarjee, Indiradip _4oth |
|
| 700 | 1 |
_aBhattacharyya, Siddhartha _4oth |
|
| 700 | 1 |
_aGuipta, Shibakali _4oth |
|
| 245 | 1 | 0 | _aBig Data Security (Volume 3) |
| 260 |
_bDe Gruyter _c2019 |
||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aAfter a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology. | ||
| 536 | _aKnowledge Unlatched | ||
| 540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by-nc-nd/4.0/legalcode _2cc _4https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aData mining _2bicssc |
|
| 653 | _aComputers | ||
| 653 | _aData Science | ||
| 653 | _aData Analytics | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/43819/1/external_content.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/34730 _70 _zDOAB: description of the publication |
| 999 |
_c36809 _d36809 |
||