000 01847nam a22003737a 4500
003 OSt
005 20250619102807.0
008 250619b |||||||| |||| 00| 0 eng d
020 _a9783030015657
_q(hardcover)
040 _beng
_cDLC
_dDLC
_erda
_aSai University Library
082 _223
_a004.678
_bJEY
245 0 0 _aUbiquitous Computing and Computing Security of IoT
_cN. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
250 _a1st Edition
260 _aCham, Switzerland :
_bSpringer,
_c2019
264 _aCham, Switzerland :
_bSpringer,
_c© 2019
300 _av, 127 pages :
_billustrations (color)
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
490 _aStudies in big data ;
_vvolume 47
500 _aGifted by Ajith Abraham
504 _aIncludes bibliographical references
520 _aThis provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
650 0 _aInternet of things
_xSecurity measures
650 0 _aUbiquitous computing
650 0 _aEngineering
650 0 _aArtificial intelligence
700 1 _aJeyanthi, N.
_eeditor
700 1 _aAbraham, Ajith
_eeditor
700 1 _aMcheick, Hamid
_eeditor
830 _aStudies in big data ;
_vv. 47
856 4 2 _3Table of Contents only
_uhttps://link.springer.com/book/10.1007/978-3-030-01566-4#toc
942 _2ddc
_cBK
999 _c6790
_d6790