The main goalof this book is sharing the recent achievements of Edge & Fog Computing inour lab. It contains three parts. In the first part, we focus on the resourcemanagement in Edge & Fog Computing including Resource Caching Scheme in FogComputing, Radio Resource Management in 5GFog Cell, Transmission of Malware in Fog Computing, Incentive to ContributeResource-based Crowd funding in Fog Computing, Resource Scheduling Scheme inFog Computing, Resource sharing Model in Fog Computing, and Fair ResourceAllocation in IDS for Edge Computing. In the second part, we introduce thesecurity management in Edge & Fog Computing including Security Model in FogComputing, Node State Monitoring Scheme in Fog Computing, IDS Model in FogComputing, Key Management Scheme in Fog Computing, Intrusion Response Strategyin Fog Computing, Intrusion Detection in Fog Computing, and Security Mechanismin Fog Computing. In the third part, we propose some applications of Edge &Fog Computing. They are Real-time Fast Bi-dimensional Empirical ModeDecomposition, Resource Management Scheme in Vehicular Social Edge Computing,and Real-time Image Restoration in Edge Computing.