Big Data Security Volumen 3

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Autores:
Tipo de recurso:
Book
Fecha de publicación:
2021
Institución:
Universidad de Bogotá Jorge Tadeo Lozano
Repositorio:
Expeditio: repositorio UTadeo
Idioma:
eng
OAI Identifier:
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16759
Acceso en línea:
https://www.degruyter.com/view/title/539861
http://hdl.handle.net/20.500.12010/16759
Palabra clave:
Almacenamiento de datos
Tecnología de los medios digitales
Tecnología -- Software -- Hardware
Contenido hipermedia -- Big data
Rights
License
Abierto (Texto Completo)
id UTADEO2_e2ee3b8bf2777a945c9c924dd1b59b72
oai_identifier_str oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/16759
network_acronym_str UTADEO2
network_name_str Expeditio: repositorio UTadeo
repository_id_str
dc.title.spa.fl_str_mv Big Data Security Volumen 3
title Big Data Security Volumen 3
spellingShingle Big Data Security Volumen 3
Almacenamiento de datos
Tecnología de los medios digitales
Tecnología -- Software -- Hardware
Contenido hipermedia -- Big data
title_short Big Data Security Volumen 3
title_full Big Data Security Volumen 3
title_fullStr Big Data Security Volumen 3
title_full_unstemmed Big Data Security Volumen 3
title_sort Big Data Security Volumen 3
dc.subject.spa.fl_str_mv Almacenamiento de datos
topic Almacenamiento de datos
Tecnología de los medios digitales
Tecnología -- Software -- Hardware
Contenido hipermedia -- Big data
dc.subject.lemb.spa.fl_str_mv Tecnología de los medios digitales
Tecnología -- Software -- Hardware
Contenido hipermedia -- Big data
description After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2021-01-19T21:14:34Z
dc.date.available.none.fl_str_mv 2021-01-19T21:14:34Z
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2f33
format http://purl.org/coar/resource_type/c_2f33
dc.identifier.isbn.none.fl_str_mv 978-3-110-60605-8
dc.identifier.issn.none.fl_str_mv 2512-8868
dc.identifier.other.none.fl_str_mv https://www.degruyter.com/view/title/539861
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/20.500.12010/16759
dc.identifier.doi.none.fl_str_mv 10.1515/9783110606058 Lang
identifier_str_mv 978-3-110-60605-8
2512-8868
10.1515/9783110606058 Lang
url https://www.degruyter.com/view/title/539861
http://hdl.handle.net/20.500.12010/16759
dc.language.iso.spa.fl_str_mv eng
language eng
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.local.spa.fl_str_mv Abierto (Texto Completo)
dc.rights.creativecommons.none.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
rights_invalid_str_mv Abierto (Texto Completo)
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
http://purl.org/coar/access_right/c_abf2
dc.format.extent.spa.fl_str_mv 158 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv De Gruyter
institution Universidad de Bogotá Jorge Tadeo Lozano
bitstream.url.fl_str_mv https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/1/Big%20Data%20Security%20Big%20Data%20Security_47.pdf
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/2/license.txt
https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/3/Big%20Data%20Security%20Big%20Data%20Security_47.pdf.jpg
bitstream.checksum.fl_str_mv 74622396c2812a41bf6692f60613ad11
abceeb1c943c50d3343516f9dbfc110f
b6f47bff33eb4f3ab01b44dd12f5cff3
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional - Universidad Jorge Tadeo Lozano
repository.mail.fl_str_mv expeditio@utadeo.edu.co
_version_ 1814213940898430976
spelling 2021-01-19T21:14:34Z2021-01-19T21:14:34Z978-3-110-60605-82512-8868https://www.degruyter.com/view/title/539861http://hdl.handle.net/20.500.12010/1675910.1515/9783110606058 Lang158 páginasapplication/pdfengDe GruyterAlmacenamiento de datosTecnología de los medios digitalesTecnología -- Software -- HardwareContenido hipermedia -- Big dataBig Data Security Volumen 3Abierto (Texto Completo)https://creativecommons.org/licenses/by-nc-nd/4.0/legalcodehttp://purl.org/coar/access_right/c_abf2After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.http://purl.org/coar/resource_type/c_2f33Gupta, ShibakaliBanerjee, IndradipBhattacharyya, SiddharthaORIGINALBig Data Security Big Data Security_47.pdfBig Data Security Big Data Security_47.pdfVer documentoapplication/pdf2160105https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/1/Big%20Data%20Security%20Big%20Data%20Security_47.pdf74622396c2812a41bf6692f60613ad11MD51open accessLICENSElicense.txtlicense.txttext/plain; charset=utf-82938https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/2/license.txtabceeb1c943c50d3343516f9dbfc110fMD52open accessTHUMBNAILBig Data Security Big Data Security_47.pdf.jpgBig Data Security Big Data Security_47.pdf.jpgIM Thumbnailimage/jpeg1957https://expeditiorepositorio.utadeo.edu.co/bitstream/20.500.12010/16759/3/Big%20Data%20Security%20Big%20Data%20Security_47.pdf.jpgb6f47bff33eb4f3ab01b44dd12f5cff3MD53open access20.500.12010/16759oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/167592021-01-31 21:58:49.798open accessRepositorio Institucional - Universidad Jorge Tadeo Lozanoexpeditio@utadeo.edu.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