000 03592cam a2200553 i 4500
001 9780429322969
003 FlBoTFG
005 20220509192950.0
006 m d | |
007 cr |||||||||||
008 200429t20212021flua ob 001 0 eng
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781000201604
_qelectronic book
020 _a1000201600
_qelectronic book
020 _a9780429322969
_qelectronic book
020 _a0429322968
_qelectronic book
020 _a9781000201666
_qelectronic book
020 _a100020166X
_qelectronic book
020 _a9781000201635
_q(electronic bk. : Mobipocket)
020 _a1000201635
_q(electronic bk. : Mobipocket)
020 _z9780367334390
_qhardcover
035 _a(OCoLC)1157483757
_z(OCoLC)1226504424
035 _a(OCoLC-P)1157483757
050 0 4 _aTK5105.8857
_b.P754 2021
072 7 _aTEC
_x020000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aTGP
_2bicssc
082 0 0 _a005.8
_223
245 0 0 _aPrivacy vulnerabilities and data security challenges in the IoT /
_cedited by Shivani Agarwal, Sandhya Makkar, and Duc-Tan Tran.
250 _aFirst edition.
264 1 _aBoca Raton, FL :
_bCRC Press,
_c2021.
264 4 _c©2021
300 _a1 online resource (xiv, 219 pages) :
_billustrations (some color).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aInternet of everything (IoE) : security and privacy paradigm
520 _a"This book discusses the evolution of security and privacy issues in the Internet of Things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in the industry can easily understand the IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture through IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience incorporates specialists, researchers, graduate understudies, designers, experts and engineers who are occupied with research and security related issues"--
_cProvided by publisher.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aInternet of things
_xSecurity measures.
650 7 _aTECHNOLOGY / Manufacturing
_2bisacsh
650 7 _aCOMPUTERS / Computer Science
_2bisacsh
650 7 _aCOMPUTERS / Data Processing / General
_2bisacsh
700 1 _aAgarwal, Shivani,
_eeditor.
700 1 _aMakkar, Sandhya,
_eeditor.
700 1 _aTran, Duc-Tan,
_eeditor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9780429322969
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c127382
_d127382