LIBRARY CATALOGUE
Knowledge • Research • Discovery
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Ubiquitous Computing and Computing Security of IoT N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.

Contributor(s): Material type: TextSeries: Studies in big data ; volume 47 | Studies in big data ; v. 47Cham, Switzerland : Springer, © 2019Edition: 1st EditionDescription: v, 127 pages : illustrations (color)Content type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9783030015657
Subject(s): DDC classification:
  • 23 004.678 JEY
Online resources: Summary: This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Gifted Books Sai University Library General stacks 004.678 JEY (Browse shelf(Opens below)) Available G2970

Gifted by Ajith Abraham

Includes bibliographical references

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

There are no comments on this title.

to post a comment.
Copyright © 2026 – Sai University Library