Internet of Things : (Record no. 72115)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03258cam a22005658i 4500 |
001 - CONTROL NUMBER | |
control field | 9781003032441 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711212752.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 201007s2020 flua o 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000291677 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000291636 |
-- | (PDF ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000291634 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000291650 |
-- | (Mobipocket ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000291650 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781003032441 |
-- | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1003032443 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000291674 |
-- | (electronic bk.) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 00 - TITLE STATEMENT | |
Title | Internet of Things : |
Sub Title | integration and security challenges / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource : |
520 ## - SUMMARY, ETC. | |
Summary, etc | IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Velliangiri, S., |
700 1# - AUTHOR 2 | |
Author 2 | Kumar, Sathish A. P., |
700 1# - AUTHOR 2 | |
Author 2 | Karthikeyan, P., |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781003032441 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | 2020. |
336 ## - | |
-- | text |
-- | rdacontent |
336 ## - | |
-- | still image |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of things |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Database Management / Data Mining |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Internet / Security |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | TECHNOLOGY / Manufacturing |
No items available.