Ubiquitous Computing and Computing Security of IoT (Record no. 75215)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03085nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-01566-4 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801213453.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181003s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783030015664 |
-- | 978-3-030-01566-4 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.3 |
245 10 - TITLE STATEMENT | |
Title | Ubiquitous Computing and Computing Security of IoT |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | V, 127 p. 47 illus., 25 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Studies in Big Data, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. |
700 1# - AUTHOR 2 | |
Author 2 | Jeyanthi, N. |
700 1# - AUTHOR 2 | |
Author 2 | Abraham, Ajith. |
700 1# - AUTHOR 2 | |
Author 2 | Mcheick, Hamid. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-030-01566-4 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Big data. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Big Data. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial Intelligence. |
700 1# - AUTHOR 2 | |
-- | (orcid)0000-0002-2589-8609 |
-- | https://orcid.org/0000-0002-2589-8609 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2197-6511 ; |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.