Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applied approach to privacy and secu...
~
Chatterjee, Parag, (1992-)
Linked to FindBook
Google Book
Amazon
博客來
Applied approach to privacy and security for the Internet of things
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applied approach to privacy and security for the Internet of things/ edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
other author:
Chatterjee, Parag,
Published:
Hershey, Pennsylvania :IGI Global, : 2020.,
Description:
1 online resource (xix, 295 p.)
[NT 15003449]:
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
Subject:
Internet of things - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
ISBN:
9781799824466 (ebk.)
Applied approach to privacy and security for the Internet of things
Applied approach to privacy and security for the Internet of things
[electronic resource] /edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (xix, 295 p.)
Includes bibliographical references and index.
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
ISBN: 9781799824466 (ebk.)Subjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .A67 2020
Dewey Class. No.: 005.8
Applied approach to privacy and security for the Internet of things
LDR
:02129nmm a2200265 a 4500
001
2246902
003
IGIG
005
19991022091623.0
006
m o d
007
cr cn
008
211227s2020 pau fob 001 0 eng d
020
$a
9781799824466 (ebk.)
020
$a
9781799824442 (hbk.)
020
$a
9781799824459 (pbk.)
035
$a
(OCoLC)1162955377
035
$a
1101012258
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.8857
$b
.A67 2020
082
0 0
$a
005.8
$2
23
245
0 0
$a
Applied approach to privacy and security for the Internet of things
$h
[electronic resource] /
$c
edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (xix, 295 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
520
3
$a
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
$c
Provided by publisher.
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
0
$a
Embedded Internet devices
$x
Security measures.
$3
3510700
650
0
$a
Computer networks
$x
Security measures.
$3
579161
700
1
$a
Chatterjee, Parag,
$d
1992-
$3
3510697
700
1
$a
Benoist, Emmanuel,
$d
1972-
$3
3510698
700
1
$a
Nath, Asoke,
$d
1953-
$3
3510699
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9407273
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857 .A67 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login