語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applied approach to privacy and secu...
~
Chatterjee, Parag, (1992-)
FindBook
Google Book
Amazon
博客來
Applied approach to privacy and security for the Internet of things
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Applied approach to privacy and security for the Internet of things/ edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
其他作者:
Chatterjee, Parag,
出版者:
Hershey, Pennsylvania :IGI Global, : 2020.,
面頁冊數:
1 online resource (xix, 295 p.)
內容註:
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
標題:
Internet of things - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
ISBN:
9781799824466 (ebk.)
Applied approach to privacy and security for the Internet of things
Applied approach to privacy and security for the Internet of things
[electronic resource] /edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. - Hershey, Pennsylvania :IGI Global,2020. - 1 online resource (xix, 295 p.)
Includes bibliographical references and index.
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
ISBN: 9781799824466 (ebk.)Subjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .A67 2020
Dewey Class. No.: 005.8
Applied approach to privacy and security for the Internet of things
LDR
:02129nmm a2200265 a 4500
001
2246902
003
IGIG
005
19991022091623.0
006
m o d
007
cr cn
008
211227s2020 pau fob 001 0 eng d
020
$a
9781799824466 (ebk.)
020
$a
9781799824442 (hbk.)
020
$a
9781799824459 (pbk.)
035
$a
(OCoLC)1162955377
035
$a
1101012258
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.8857
$b
.A67 2020
082
0 0
$a
005.8
$2
23
245
0 0
$a
Applied approach to privacy and security for the Internet of things
$h
[electronic resource] /
$c
edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2020.
300
$a
1 online resource (xix, 295 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.
520
3
$a
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
$c
Provided by publisher.
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
0
$a
Embedded Internet devices
$x
Security measures.
$3
3510700
650
0
$a
Computer networks
$x
Security measures.
$3
579161
700
1
$a
Chatterjee, Parag,
$d
1992-
$3
3510697
700
1
$a
Benoist, Emmanuel,
$d
1972-
$3
3510698
700
1
$a
Nath, Asoke,
$d
1953-
$3
3510699
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9407273
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857 .A67 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入