Privacy-preserving computing for big data analytics and AI (Record no. 33241)

000 -LEADER
fixed length control field nam a22 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240405b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781009299510
Terms of availability hbk.
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number CHE
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Chen, Kai
245 ## - TITLE STATEMENT
Title Privacy-preserving computing for big data analytics and AI
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Cambridge University Press,
Date of publication, distribution, etc 2022
Place of publication, distribution, etc Cambridge :
300 ## - PHYSICAL DESCRIPTION
Extent xii, 255 p. ;
Other physical details ill.,
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount 49.99
Price type code
Unit of pricing 109.40
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Big data
Topical term or geographic name as entry element USENIX
Topical term or geographic name as entry element Privacy-preserving computing
Topical term or geographic name as entry element Secure multiparty computation
Topical term or geographic name as entry element Trusted Execution Environment
Topical term or geographic name as entry element Oblivious Transfer
Topical term or geographic name as entry element Bloom filter
Topical term or geographic name as entry element Ciphertext
Topical term or geographic name as entry element Data privacy
Topical term or geographic name as entry element Differential privacy
Topical term or geographic name as entry element Homomorphic encryption
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Big data
Topical term or geographic name as entry element Information technology
Topical term or geographic name as entry element Security measures privacy
Topical term or geographic name as entry element Right of IT security
Topical term or geographic name as entry element Security
Topical term or geographic name as entry element Intel SGX
Topical term or geographic name as entry element Machine learning
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Qiang
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2024-04-03 5468.91 005.8 CHE 034949 2024-04-05 Books

Powered by Koha