Cantitate/Preț
Produs

Ubiquitous Computing and Computing Security of IoT: Studies in Big Data, cartea 47

Editat de N. Jeyanthi, Ajith Abraham, Hamid Mcheick
en Limba Engleză Paperback – 10 dec 2019
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 63756 lei  6-8 săpt.
  Springer International Publishing – 10 dec 2019 63756 lei  6-8 săpt.
Hardback (1) 64383 lei  6-8 săpt.
  Springer International Publishing – 12 oct 2018 64383 lei  6-8 săpt.

Din seria Studies in Big Data

Preț: 63756 lei

Preț vechi: 79695 lei
-20% Nou

Puncte Express: 956

Preț estimativ în valută:
12201 12588$ 10327£

Carte tipărită la comandă

Livrare economică 04-18 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030131869
ISBN-10: 3030131866
Pagini: 127
Ilustrații: V, 127 p. 47 illus., 25 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.2 kg
Ediția:Softcover reprint of the original 1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seria Studies in Big Data

Locul publicării:Cham, Switzerland

Cuprins

Security Protocols for IoT.- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences.- Security of Big Data in Internet of Things.- Trust Management Approaches in Mobile Adhoc Networks.- IoT for Ubiquitous Learning Applications: Current Trends and Future.

Textul de pe ultima copertă

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Caracteristici

Addresses all aspects of computing security Focuses on security issues as well as on fundamentals, architectures and real-time applications Presents recent research on ubiquitous computing and the computing security of the Internet of Things (IoT)