The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking.
Due to the rapid growth of all kinds of devices currently being controlled over the Internet, the various products come with security issues. This book examines these issues and vulnerabilities inherent in the products and what can be done to solve them by investigating their roots. Programming and attention to good security practices can combat these problems, which is a result of the lax security processes of the Internet of Things, cloud computing and social media.
The 16 chapters are divided into three groups. Part 1 is on Security Designs for the Cloud Network; Part 2 focuses on Security Designs for the Internet of Things and Social Networks; while the concluding Part looks at Security Designs for Solutions and Applications. Collectively, the chapters
Audience
This book is directed to IT engineers, programmers, security professionals, and a wide array of interested hackers and device makers requiring an understanding of the vulnerabilities associated with the Internet of Things and cloud computing.