Book Review: Secure Edge Computing: Applications, Techniques, and Challenges

Book Review: Secure Edge Computing: Applications, Techniques, and Challenges
Published on

This article will give you a review of the book "Secure Edge Computing: Applications, Techniques, and Challenges".

The book, "Secure Edge Computing: Applications, Techniques, and Challenges" is edited by Mohiuddin Ahmed, Paul Haskell-Dowland. The book is published on August 13, 2021. The internet is revolutionizing our daily lives, ushering in a new age known as the Internet of Everything (IoE). Edge computing is a new data analytics approach that solves the issues that come with the Internet of Things. Edge computing, in particular, allows data processing at the network's edge rather than interfacing with cloud-based servers. As a result, more and more devices must be installed in remote areas without a comprehensive monitoring strategy in place.

Because of the increasing connectivity and the devices utilized for edge computing, cybercriminals will have additional opportunities to exploit the system's flaws. It should not be an afterthought or a big task to ensure cyber security at the periphery. Edge computing devices aren't built with standard IT hardware protocols in mind. In the context of edge computing and the Internet of Things (IoT) in remote places, there are a variety of use cases. However, when it comes to fighting cybercrime and ensuring data privacy, cybersecurity settings and software upgrades are frequently ignored. As a result, the dangerous environment in the context of edge computing expands and becomes considerably more difficult to navigate.

Throughout the network's whole value chain, there is an obvious requirement for collaborative collaboration. This book tackles the cybersecurity problems associated with edge computing in this setting, providing a comprehensive overview of the principles, methodologies, applications, and open research areas in this field. Furthermore, the book provides a one-stop-shop for learning about the technology, processes, and people engaged in next-generation computing and security. It will be a helpful resource for academics, graduate students, and professionals in the field.

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

                                                                                                       _____________                                             

Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.

Related Stories

No stories found.
logo
Analytics Insight
www.analyticsinsight.net