Ubiquitous computing and computing security of IoT /

Saved in:
Bibliographic Details
Imprint:Cham, Switzerland : Springer, [2019]
Description:1 online resource
Language:English
Series:Studies in big data ; volume 47
Studies in big data ; v. 47.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11745987
Hidden Bibliographic Details
Other authors / contributors:Jeyanthi, N., editor.
Abraham, Ajith, 1968- editor.
Mcheick, Hamid, editor.
ISBN:9783030015664
3030015661
9783030015671
303001567X
9783030015657
3030015653
9783030131869
3030131866
Digital file characteristics:text file PDF
Notes:Includes bibliographical references.
Online resource; title from digital title page (viewed on February 14, 2019).
Summary:This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
Other form:Print version: Jeyanthi, N. Ubiquitous Computing and Computing Security of IoT. Cham : Springer, ©2018 9783030015657
Standard no.:10.1007/978-3-030-01566-4

MARC

LEADER 00000cam a2200000Ii 4500
001 11745987
005 20210625185309.3
006 m o d
007 cr cnu---unuuu
008 181013s2019 sz ob 000 0 eng d
015 |a GBB935002  |2 bnb 
016 7 |a 019082051  |2 Uk 
019 |a 1056743966  |a 1076528903  |a 1084417228  |a 1156333159 
020 |a 9783030015664  |q (electronic book) 
020 |a 3030015661  |q (electronic book) 
020 |a 9783030015671  |q (print) 
020 |a 303001567X 
020 |z 9783030015657 
020 |z 3030015653 
020 |a 9783030131869  |q (print) 
020 |a 3030131866 
024 7 |a 10.1007/978-3-030-01566-4  |2 doi 
035 |a (OCoLC)1056909525  |z (OCoLC)1056743966  |z (OCoLC)1076528903  |z (OCoLC)1084417228  |z (OCoLC)1156333159 
035 9 |a (OCLCCM-CC)1056909525 
037 |a com.springer.onix.9783030015664  |b Springer Nature 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d OCLCF  |d N$T  |d OCLCQ  |d UAB  |d CAUOI  |d YDXIT  |d UKMGB  |d UX1  |d COO  |d OCLCQ  |d A7U  |d OCLCQ  |d VT2  |d LEAUB  |d ADU  |d OCLCQ 
049 |a MAIN 
050 4 |a TK5105.8857  |b .U25 2019 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
072 7 |a UYQ  |2 bicssc 
072 7 |a UYQ  |2 thema 
245 0 0 |a Ubiquitous computing and computing security of IoT /  |c N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2019] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in big data ;  |v volume 47 
504 |a Includes bibliographical references. 
505 0 0 |t Security Protocols for IoT /  |r J. Cynthia, H. Parveen Sultana, M.N. Saroja, J. Senthil --  |t Security of Big Data in Internet of Things /  |r Rakesh Bandarupalli, H. Parveen Sultana --  |t IoT for Ubiquitous Learning Applications : Current Trends and Future Prospects /  |r Salsabeel Shapsough, Imran A. Zualkernan --  |t Trust Management Approaches in Mobile Adhoc Networks /  |r R. Vijayan, Jeyanthi N. --  |t Security in Ubiquitous Computing Environment : Vulnerabilities, Attacks and Defenses /  |r C. Shoba Bindu, C. Sasikala. 
588 0 |a Online resource; title from digital title page (viewed on February 14, 2019). 
520 |a This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. 
650 0 |a Internet of things  |x Security measures. 
650 0 |a Ubiquitous computing.  |0 http://id.loc.gov/authorities/subjects/sh2002000759 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Ubiquitous computing.  |2 fast  |0 (OCoLC)fst01160283 
655 4 |a Electronic books. 
700 1 |a Jeyanthi, N.,  |e editor. 
700 1 |a Abraham, Ajith,  |d 1968-  |e editor.  |0 http://id.loc.gov/authorities/names/n2002158811 
700 1 |a Mcheick, Hamid,  |e editor. 
776 0 8 |i Print version:  |a Jeyanthi, N.  |t Ubiquitous Computing and Computing Security of IoT.  |d Cham : Springer, ©2018  |z 9783030015657 
830 0 |a Studies in big data ;  |v v. 47.  |0 http://id.loc.gov/authorities/names/no2014005813 
903 |a HeVa 
929 |a oclccm 
999 f f |i 5012af29-6784-5886-b02d-099b243c6a7e  |s 84b2502b-0205-542d-982c-6ecd2b938db8 
928 |t Library of Congress classification  |a TK5105.8857 .U25 2019  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-030-01566-4  |z Springer Nature  |g ebooks  |i 12557824