Special Offer from Cutter Consortium
Fog Computing: Securing the Intelligent Edge in Next-Generation Networks
by Frank Michaud and John K. Zao
In this article, Frank Michaud and John K. Zao take an in-depth look at the role of fog computing — specifically fog architecture — in cybersecurity protection for today’s “connected-everything/data-everywhere” systems. The authors explain fog node–centric security, provide some real-world examples, and delve into physical security of the fog nodes, end-to-end security within the device-fog-cloud continuum, and security monitoring and management among the hardware/software entities present in the continuum.
Download your complimentary copy of Fog Computing: Securing the Intelligent Edge in Next-Generation Networks when you fill out our special offer form below.
Already a Cutter client? Read it now.
Fog Computing: Securing the Intelligent Edge in Next-Generation Networks is one of five articles in the report, Fog/Edge Computing: Opportunities, Case Studies, Challenges. Click here for more information.
Don't miss another issue — subscribe to the monthly Cutter Business Technology Journal today!
Subscribe Now! Use Coupon Code CBTJ50!