語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applied approach to privacy and secu...
~
Nath, Asoke, (1953-)
Applied approach to privacy and security for the Internet of things
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Applied approach to privacy and security for the Internet of things/ edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
其他作者:
Nath, Asoke,
出版者:
Hershey, Pennsylvania :IGI Global, : 2020.,
面頁冊數:
1 online resource (xix, 295 p.)
標題:
Computer networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
ISBN:
9781799824466 (ebk.)
Applied approach to privacy and security for the Internet of things
Applied approach to privacy and security for the Internet of things
[electronic resource] /edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (xix, 295 p.)
Includes bibliographical references and index.
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
ISBN: 9781799824466 (ebk.)Subjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.8857 / .A67 2020
Dewey Class. No.: 005.8
Applied approach to privacy and security for the Internet of things
LDR
:02129nam a2200265 a 4500
001
1041387
003
IGIG
005
19991022091623.0
006
m o d
007
cr cn
008
211215s2020 pau fob 001 0 eng d
020
$a
9781799824466 (ebk.)
020
$a
9781799824442 (hbk.)
020
$a
9781799824459 (pbk.)
035
$a
(OCoLC)1162955377
035
$a
1101012258
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.8857
$b
.A67 2020
082
0 0
$a
005.8
$2
23
245
0 0
$a
Applied approach to privacy and security for the Internet of things
$h
[electronic resource] /
$c
edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (xix, 295 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
520
3
$a
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Embedded Internet devices
$x
Security measures.
$3
1340849
650
0
$a
Internet of things
$x
Security measures.
$3
1129535
700
1
$a
Nath, Asoke,
$d
1953-
$3
1340848
700
1
$a
Benoist, Emmanuel,
$d
1972-
$3
1340847
700
1
$a
Chatterjee, Parag,
$d
1992-
$3
1340846
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入