Data Security and Data Processing: Introduction and overview

Data Security and Data Processing: Introduction and overview
Title Data Security and Data Processing: Introduction and overview PDF eBook
Author International Business Machines Corporation
Publisher
Pages 26
Release 1974
Genre Computer security
ISBN

Download Data Security and Data Processing: Introduction and overview Book in PDF, Epub and Kindle

Data Security and Data Processing

Data Security and Data Processing
Title Data Security and Data Processing PDF eBook
Author International Business Machines Corporation (Armonk, N.Y.)
Publisher
Pages 20
Release 1974
Genre
ISBN

Download Data Security and Data Processing Book in PDF, Epub and Kindle

Data Security and Data Processing: Study summary

Data Security and Data Processing: Study summary
Title Data Security and Data Processing: Study summary PDF eBook
Author International Business Machines Corporation
Publisher
Pages 40
Release 1974
Genre Computer security
ISBN

Download Data Security and Data Processing: Study summary Book in PDF, Epub and Kindle

Cryptography and Data Security

Cryptography and Data Security
Title Cryptography and Data Security PDF eBook
Author Dorothy Elizabeth Robling Denning
Publisher Addison Wesley Publishing Company
Pages 422
Release 1982
Genre History
ISBN

Download Cryptography and Data Security Book in PDF, Epub and Kindle

Encryption algorithms. Cryptographic technique. Access controls. Information controls. Inference controls.

Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois

Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois
Title Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois PDF eBook
Author International Business Machines Corporation
Publisher
Pages 52
Release 1974
Genre Computer security
ISBN

Download Data Security and Data Processing: pt. 1. State of Illinois: executive overview. pt. 2. Study results: State of Illinois Book in PDF, Epub and Kindle

Federal Information Processing Standards Publication

Federal Information Processing Standards Publication
Title Federal Information Processing Standards Publication PDF eBook
Author
Publisher
Pages 78
Release 1968
Genre Electronic data processing
ISBN

Download Federal Information Processing Standards Publication Book in PDF, Epub and Kindle

Secure Data Science

Secure Data Science
Title Secure Data Science PDF eBook
Author Bhavani Thuraisingham
Publisher CRC Press
Pages 457
Release 2022-04-27
Genre Computers
ISBN 1000557502

Download Secure Data Science Book in PDF, Epub and Kindle

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area—including healthcare, finance, manufacturing, and marketing—could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.