IoT applications, security threats, and countermeasures / (Record no. 71358)

000 -LEADER
fixed length control field 03448cam a2200577 i 4500
001 - CONTROL NUMBER
control field 9781003124252
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212455.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210309t20222022fluab ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003124252
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003124259
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000431650
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000431657
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000431643
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000431649
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- paperback
082 00 - CLASSIFICATION NUMBER
Call Number 005.8/7
245 00 - TITLE STATEMENT
Title IoT applications, security threats, and countermeasures /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (xvi, 261 pages) :
490 1# - SERIES STATEMENT
Series statement Internet of Everything (IoE) : security and privacy paradigm
505 2# - FORMATTED CONTENTS NOTE
Remark 2 IoT : the technological fad of the digital age / Corinne Jacqueline Perera, Shangrao University, China -- Significance of smart sensors for IoT applications / Vinay Kumar Awaar, Praveen Jugge, Padmalaya Nayak -- Applications of the batch Markovian arrival process in IoT / Srinivas R. Chakravarthy.
520 ## - SUMMARY, ETC.
Summary, etc "The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture. Fundamental concepts of gathering, processing, and analyzing different Artificial Intelligence (AI) models in IoT applications are covered along with recent detection mechanisms for different types of attacks for effective network communication. On par with the standards laid out by international organizations in related fields, the book focuses on both core concepts of IoT along with major application areas. Designed for technical developers, academicians, data scientists, industrial researchers, professionals, and students, this book is useful in uncovering the latest innovations in the field of IoT"--
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Nayak, Padmalaya,
700 1# - AUTHOR 2
Author 2 Ray, Niranjan K.,
700 1# - AUTHOR 2
Author 2 Ravichandran, P.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003124252
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton :
-- CRC Press,
-- 2022.
264 #4 -
-- ©2022
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Internet of things
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Information Technology
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / Security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Cryptography

No items available.