Ubiquitous computing and computing security of IoT /
Saved in:
Imprint: | Cham, Switzerland : Springer, [2019] |
---|---|
Description: | 1 online resource |
Language: | English |
Series: | Studies in big data ; volume 47 Studies in big data ; v. 47. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11745987 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11745987 | ||
005 | 20210625185309.3 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181013s2019 sz ob 000 0 eng d | ||
015 | |a GBB935002 |2 bnb | ||
016 | 7 | |a 019082051 |2 Uk | |
019 | |a 1056743966 |a 1076528903 |a 1084417228 |a 1156333159 | ||
020 | |a 9783030015664 |q (electronic book) | ||
020 | |a 3030015661 |q (electronic book) | ||
020 | |a 9783030015671 |q (print) | ||
020 | |a 303001567X | ||
020 | |z 9783030015657 | ||
020 | |z 3030015653 | ||
020 | |a 9783030131869 |q (print) | ||
020 | |a 3030131866 | ||
024 | 7 | |a 10.1007/978-3-030-01566-4 |2 doi | |
035 | |a (OCoLC)1056909525 |z (OCoLC)1056743966 |z (OCoLC)1076528903 |z (OCoLC)1084417228 |z (OCoLC)1156333159 | ||
035 | 9 | |a (OCLCCM-CC)1056909525 | |
037 | |a com.springer.onix.9783030015664 |b Springer Nature | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d GW5XE |d YDX |d OCLCF |d N$T |d OCLCQ |d UAB |d CAUOI |d YDXIT |d UKMGB |d UX1 |d COO |d OCLCQ |d A7U |d OCLCQ |d VT2 |d LEAUB |d ADU |d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a TK5105.8857 |b .U25 2019 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a UYQ |2 bicssc | |
072 | 7 | |a UYQ |2 thema | |
245 | 0 | 0 | |a Ubiquitous computing and computing security of IoT / |c N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors. |
264 | 1 | |a Cham, Switzerland : |b Springer, |c [2019] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Studies in big data ; |v volume 47 | |
504 | |a Includes bibliographical references. | ||
505 | 0 | 0 | |t Security Protocols for IoT / |r J. Cynthia, H. Parveen Sultana, M.N. Saroja, J. Senthil -- |t Security of Big Data in Internet of Things / |r Rakesh Bandarupalli, H. Parveen Sultana -- |t IoT for Ubiquitous Learning Applications : Current Trends and Future Prospects / |r Salsabeel Shapsough, Imran A. Zualkernan -- |t Trust Management Approaches in Mobile Adhoc Networks / |r R. Vijayan, Jeyanthi N. -- |t Security in Ubiquitous Computing Environment : Vulnerabilities, Attacks and Defenses / |r C. Shoba Bindu, C. Sasikala. |
588 | 0 | |a Online resource; title from digital title page (viewed on February 14, 2019). | |
520 | |a This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future. | ||
650 | 0 | |a Internet of things |x Security measures. | |
650 | 0 | |a Ubiquitous computing. |0 http://id.loc.gov/authorities/subjects/sh2002000759 | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Ubiquitous computing. |2 fast |0 (OCoLC)fst01160283 | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Jeyanthi, N., |e editor. | |
700 | 1 | |a Abraham, Ajith, |d 1968- |e editor. |0 http://id.loc.gov/authorities/names/n2002158811 | |
700 | 1 | |a Mcheick, Hamid, |e editor. | |
776 | 0 | 8 | |i Print version: |a Jeyanthi, N. |t Ubiquitous Computing and Computing Security of IoT. |d Cham : Springer, ©2018 |z 9783030015657 |
830 | 0 | |a Studies in big data ; |v v. 47. |0 http://id.loc.gov/authorities/names/no2014005813 | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 5012af29-6784-5886-b02d-099b243c6a7e |s 84b2502b-0205-542d-982c-6ecd2b938db8 |
928 | |t Library of Congress classification |a TK5105.8857 .U25 2019 |l Online |c UC-FullText |u https://link.springer.com/10.1007/978-3-030-01566-4 |z Springer Nature |g ebooks |i 12557824 |