|
" Ubiquitous computing and computing security of IoT / "
N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
Document Type
|
:
|
BL
|
Record Number
|
:
|
859519
|
Title & Author
|
:
|
Ubiquitous computing and computing security of IoT /\ N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, [2019]
|
Series Statement
|
:
|
Studies in big data ;; volume 47
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
3030015661
|
|
:
|
: 303001567X
|
|
:
|
: 3030131866
|
|
:
|
: 9783030015664
|
|
:
|
: 9783030015671
|
|
:
|
: 9783030131869
|
|
:
|
3030015653
|
|
:
|
9783030015657
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references.
|
Abstract
|
:
|
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
|
Subject
|
:
|
Internet of things-- Security measures.
|
Subject
|
:
|
Ubiquitous computing.
|
Subject
|
:
|
COMPUTERS-- Computer Literacy.
|
Subject
|
:
|
COMPUTERS-- Computer Science.
|
Subject
|
:
|
COMPUTERS-- Data Processing.
|
Subject
|
:
|
COMPUTERS-- Hardware-- General.
|
Subject
|
:
|
COMPUTERS-- Information Technology.
|
Subject
|
:
|
COMPUTERS-- Machine Theory.
|
Subject
|
:
|
COMPUTERS-- Reference.
|
Subject
|
:
|
Ubiquitous computing.
|
Dewey Classification
|
:
|
004.67/8
|
LC Classification
|
:
|
TK5105.8857.U25 2019
|
Added Entry
|
:
|
Abraham, Ajith,1968-
|
|
:
|
Jeyanthi, N.
|
|
:
|
Mcheick, Hamid
|
| |