Cantitate/Preț
Produs

Ubiquitous Computing and Computing Security of IoT: Studies in Big Data, cartea 47

Editat de N. Jeyanthi, Ajith Abraham, Hamid Mcheick
en Limba Engleză Hardback – 12 oct 2018
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 60393 lei  6-8 săpt.
  Springer International Publishing – 10 dec 2019 60393 lei  6-8 săpt.
Hardback (1) 60985 lei  6-8 săpt.
  Springer International Publishing – 12 oct 2018 60985 lei  6-8 săpt.

Din seria Studies in Big Data

Preț: 60985 lei

Preț vechi: 76231 lei
-20% Nou

Puncte Express: 915

Preț estimativ în valută:
11676 12650$ 9750£

Carte tipărită la comandă

Livrare economică 12-26 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030015657
ISBN-10: 3030015653
Pagini: 134
Ilustrații: V, 127 p. 47 illus., 25 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.37 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seria Studies in Big Data

Locul publicării:Cham, Switzerland

Cuprins

Security Protocols for IoT.- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences.- Security of Big Data in Internet of Things.- Trust Management Approaches in Mobile Adhoc Networks.- IoT for Ubiquitous Learning Applications: Current Trends and Future.

Textul de pe ultima copertă

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Caracteristici

Addresses all aspects of computing security Focuses on security issues as well as on fundamentals, architectures and real-time applications Presents recent research on ubiquitous computing and the computing security of the Internet of Things (IoT)