|
|
|
|
LEADER |
03102nam a2200553 4500 |
001 |
978-3-030-01566-4 |
003 |
DE-He213 |
005 |
20191026081401.0 |
007 |
cr nn 008mamaa |
008 |
181003s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030015664
|9 978-3-030-01566-4
|
024 |
7 |
|
|a 10.1007/978-3-030-01566-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Ubiquitous Computing and Computing Security of IoT
|h [electronic resource] /
|c edited by N. Jeyanthi, Ajith Abraham, Hamid Mcheick.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a V, 127 p. 47 illus., 25 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Big Data,
|x 2197-6503 ;
|v 47
|
505 |
0 |
|
|a Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.
|
520 |
|
|
|a This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Big data.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computational Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/T11014
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Big Data.
|0 http://scigraph.springernature.com/things/product-market-codes/I29120
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
700 |
1 |
|
|a Jeyanthi, N.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Abraham, Ajith.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mcheick, Hamid.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030015657
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030015671
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030131869
|
830 |
|
0 |
|a Studies in Big Data,
|x 2197-6503 ;
|v 47
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-01566-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|