|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1049913527 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
180825s2018 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d N$T
|d MERUC
|d NRC
|d OCLCQ
|d LVT
|d UKAHL
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d TYFRS
|d AJB
|d TYFRS
|d OCLCQ
|
019 |
|
|
|a 1049582510
|a 1049934799
|
020 |
|
|
|a 9788793609525
|q (electronic bk.)
|
020 |
|
|
|a 8793609523
|q (electronic bk.)
|
020 |
|
|
|a 9781003338642
|q (electronic bk.)
|
020 |
|
|
|a 100333864X
|q (electronic bk.)
|
020 |
|
|
|a 9781000794441
|q (electronic bk. : PDF)
|
020 |
|
|
|a 100079444X
|q (electronic bk. : PDF)
|
020 |
|
|
|a 9781000791327
|q (electronic bk. : EPUB)
|
020 |
|
|
|a 1000791327
|q (electronic bk. : EPUB)
|
020 |
|
|
|z 8793609531
|
020 |
|
|
|z 9788793609532
|
024 |
7 |
|
|a 10.1201/9781003338642
|2 doi
|
029 |
1 |
|
|a AU@
|b 000068892025
|
035 |
|
|
|a (OCoLC)1049913527
|z (OCoLC)1049582510
|z (OCoLC)1049934799
|
037 |
|
|
|a 9781003338642
|b Taylor & Francis
|
050 |
|
4 |
|a TK5105.8857
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060000
|2 bisacsh
|
072 |
|
7 |
|a SCI
|x 024000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
082 |
0 |
4 |
|a 004.678
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Internet of Things Security :
|b Fundamentals, Techniques and Applications.
|
260 |
|
|
|a Aalborg :
|b River Publishers,
|c 2018.
|
300 |
|
|
|a 1 online resource (164 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers Series in Information Science and Technology
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1 -- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT.
|
505 |
8 |
|
|a 1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device.
|
505 |
8 |
|
|a 1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2 -- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05 -- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution).
|
505 |
8 |
|
|a 2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3 -- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing.
|
505 |
8 |
|
|a 3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security and Privacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4 -- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption.
|
500 |
|
|
|a 4.2.1.5 User interface.
|
520 |
|
|
|a Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them.
|
545 |
0 |
|
|a Shishir K. Shandilya, Soon Ae Chun, Smita Shandilya
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
650 |
|
6 |
|a Internet des objets
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS / Internet / General
|2 bisacsh
|
650 |
|
7 |
|a SCIENCE / Energy
|2 bisacsh
|
700 |
1 |
|
|a Shandilya, Shishir K.,
|d 1981-
|
700 |
1 |
|
|a Chun, Soon Ae.
|
700 |
1 |
|
|a Shandilya, Smita,
|d 1982-
|
700 |
1 |
|
|a Weippl, Edgar.
|
776 |
0 |
8 |
|i Print version:
|a Shandilya, Shishir K.
|t Internet of Things Security : Fundamentals, Techniques and Applications.
|d Aalborg : River Publishers, ©2018
|z 9788793609532
|
830 |
|
0 |
|a River Publishers series in information science and technology.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874792
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35016980
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1874792
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15660932
|
994 |
|
|
|a 92
|b IZTAP
|