| 000 | 01847nam a22003737a 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20250619102807.0 | ||
| 008 | 250619b |||||||| |||| 00| 0 eng d | ||
| 020 |
_a9783030015657 _q(hardcover) |
||
| 040 |
_beng _cDLC _dDLC _erda _aSai University Library |
||
| 082 |
_223 _a004.678 _bJEY |
||
| 245 | 0 | 0 |
_aUbiquitous Computing and Computing Security of IoT _cN. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors. |
| 250 | _a1st Edition | ||
| 260 |
_aCham, Switzerland : _bSpringer, _c2019 |
||
| 264 |
_aCham, Switzerland : _bSpringer, _c© 2019 |
||
| 300 |
_av, 127 pages : _billustrations (color) |
||
| 336 |
_2rdacontent _atext _btxt |
||
| 337 |
_2rdamedia _aunmediated _bn |
||
| 338 |
_2rdacarrier _avolume _bnc |
||
| 490 |
_aStudies in big data ; _vvolume 47 |
||
| 500 | _aGifted by Ajith Abraham | ||
| 504 | _aIncludes bibliographical references | ||
| 520 | _aThis provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. | ||
| 650 | 0 |
_aInternet of things _xSecurity measures |
|
| 650 | 0 | _aUbiquitous computing | |
| 650 | 0 | _aEngineering | |
| 650 | 0 | _aArtificial intelligence | |
| 700 | 1 |
_aJeyanthi, N. _eeditor |
|
| 700 | 1 |
_aAbraham, Ajith _eeditor |
|
| 700 | 1 |
_aMcheick, Hamid _eeditor |
|
| 830 |
_aStudies in big data ; _vv. 47 |
||
| 856 | 4 | 2 |
_3Table of Contents only _uhttps://link.springer.com/book/10.1007/978-3-030-01566-4#toc |
| 942 |
_2ddc _cBK |
||
| 999 |
_c6790 _d6790 |
||