Ubiquitous Computing and Computing Security of IoT (Record no. 6790)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01847nam a22003737a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250619102807.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250619b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783030015657 |
| Qualifying information | (hardcover) |
| 040 ## - CATALOGING SOURCE | |
| Language of cataloging | eng |
| Transcribing agency | DLC |
| Modifying agency | DLC |
| Description conventions | rda |
| Original cataloging agency | Sai University Library |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Edition number | 23 |
| Classification number | 004.678 |
| Item number | JEY |
| 245 00 - TITLE STATEMENT | |
| Title | Ubiquitous Computing and Computing Security of IoT |
| Statement of responsibility, etc | N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st Edition |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Cham, Switzerland : |
| Name of publisher, distributor, etc | Springer, |
| Date of publication, distribution, etc | 2019 |
| 264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Place of production, publication, distribution, manufacture | Cham, Switzerland : |
| Name of producer, publisher, distributor, manufacturer | Springer, |
| Date of production, publication, distribution, manufacture, or copyright notice | © 2019 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | v, 127 pages : |
| Other physical details | illustrations (color) |
| 336 ## - Content type term (R) | |
| Source (NR) | rdacontent |
| Content type term (R) | text |
| Content type code (R) | txt |
| 337 ## - Media Type (R) | |
| Source (NR) | rdamedia |
| Media type term (R) | unmediated |
| Media type code (R) | n |
| 338 ## - Carrier Type (R) | |
| Source (NR) | rdacarrier |
| Carrier type term (R) | volume |
| Carrier type code (R) | nc |
| 490 ## - SERIES STATEMENT | |
| Series statement | Studies in big data ; |
| Volume number/sequential designation | volume 47 |
| 500 ## - GENERAL NOTE | |
| General note | Gifted by Ajith Abraham |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Internet of things |
| General subdivision | Security measures |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Ubiquitous computing |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Engineering |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Artificial intelligence |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Jeyanthi, N. |
| Relator term | editor |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Abraham, Ajith |
| Relator term | editor |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Mcheick, Hamid |
| Relator term | editor |
| 830 ## - SERIES ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | Studies in big data ; |
| Volume number/sequential designation | v. 47 |
| 856 42 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Table of Contents only |
| Uniform Resource Identifier | <a href="https://link.springer.com/book/10.1007/978-3-030-01566-4#toc">https://link.springer.com/book/10.1007/978-3-030-01566-4#toc</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Books |
| Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Withdrawn status |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Sai University Library | Sai University Library | General stacks | 2025-06-19 | 004.678 JEY | G2970 | 2025-06-19 | 2025-06-19 | Gifted Books | Dewey Decimal Classification |