Ubiquitous computing and computing security of IoT /

Saved in:
Bibliographic Details
Imprint:Cham, Switzerland : Springer, [2019]
Description:1 online resource
Language:English
Series:Studies in big data ; volume 47
Studies in big data ; v. 47.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11745987
Hidden Bibliographic Details
Other authors / contributors:Jeyanthi, N., editor.
Abraham, Ajith, 1968- editor.
Mcheick, Hamid, editor.
ISBN:9783030015664
3030015661
9783030015671
303001567X
9783030015657
3030015653
9783030131869
3030131866
Digital file characteristics:text file PDF
Notes:Includes bibliographical references.
Online resource; title from digital title page (viewed on February 14, 2019).
Summary:This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
Other form:Print version: Jeyanthi, N. Ubiquitous Computing and Computing Security of IoT. Cham : Springer, ©2018 9783030015657
Standard no.:10.1007/978-3-030-01566-4