Blockchain, big data and machine learning : trends and applications /
Material type:
TextEdition: First editionDescription: pages cmISBN: - 9780367370688
- 9781032972459
- 005.83 KUM/B
| Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|
Reference
|
IIIT Kottayam Central Library Reference | 005.83 KUM/B (Browse shelf(Opens below)) | Not For Loan | 3030 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.83 KUM/B (Browse shelf(Opens below)) | Available | 3031 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.83 KUM/B (Browse shelf(Opens below)) | Available | 3032 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.83 KUM/B (Browse shelf(Opens below)) | Available | 3033 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.83 KUM/B (Browse shelf(Opens below)) | Available | 3034 |
Browsing IIIT Kottayam Central Library shelves, Shelving location: Reference Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.82 BEH/H Hacking Exposed | 005.82 BHA/C CompTIA CASP+ (CAS-005) Certification Guide | 005.82 SAN/C Cisco CyberOps Associate CBROPS 200-201 : official cert guide | 005.83 KUM/B Blockchain, big data and machine learning : trends and applications / | 005.83 MAL/B Blockchain for cybersecurity and privacy : architectures, challenges, and applications | 005.84 SIK/P Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software | 005.869 8 TAM/P Practical Mobile Forensics |
Includes bibliographical references and index.
"Present book covers new paradigms in Blockchain, big data and machine learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well"--
There are no comments on this title.