語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Ubiquitous computing and computing s...
~
Jeyanthi, N.
FindBook
Google Book
Amazon
博客來
Ubiquitous computing and computing security of IoT
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Ubiquitous computing and computing security of IoT/ edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick.
其他作者:
Jeyanthi, N.
出版者:
Cham :Springer International Publishing : : 2019.,
面頁冊數:
v, 127 p. :ill., digital ;24 cm.
內容註:
Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.
Contained By:
Springer eBooks
標題:
Internet of things - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-01566-4
ISBN:
9783030015664
Ubiquitous computing and computing security of IoT
Ubiquitous computing and computing security of IoT
[electronic resource] /edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick. - Cham :Springer International Publishing :2019. - v, 127 p. :ill., digital ;24 cm. - Studies in big data,v.472197-6503 ;. - Studies in big data ;v.47..
Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
ISBN: 9783030015664
Standard No.: 10.1007/978-3-030-01566-4doiSubjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .U257 2019
Dewey Class. No.: 004.678
Ubiquitous computing and computing security of IoT
LDR
:01864nmm a2200337 a 4500
001
2177196
003
DE-He213
005
20190520094124.0
006
m d
007
cr nn 008maaau
008
191122s2019 gw s 0 eng d
020
$a
9783030015664
$q
(electronic bk.)
020
$a
9783030015657
$q
(paper)
024
7
$a
10.1007/978-3-030-01566-4
$2
doi
035
$a
978-3-030-01566-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.U257 2019
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.U15 2019
245
0 0
$a
Ubiquitous computing and computing security of IoT
$h
[electronic resource] /
$c
edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
v, 127 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Studies in big data,
$x
2197-6503 ;
$v
v.47
505
0
$a
Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.
520
$a
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
0
$a
Ubiquitous computing.
$3
609947
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Big Data.
$3
3134868
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
890894
700
1
$a
Jeyanthi, N.
$3
3380006
700
1
$a
Abraham, Ajith.
$3
891046
700
1
$a
Mcheick, Hamid.
$3
3380007
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Studies in big data ;
$v
v.47.
$3
3380008
856
4 0
$u
https://doi.org/10.1007/978-3-030-01566-4
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9367062
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857 .U257 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入