|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1078997488 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
181215s2018 dk o 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d N$T
|d MERUC
|d ORZ
|d YDXIT
|d OCLCF
|d YDX
|d AJB
|d UKAHL
|d OCLCQ
|d ESU
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1078947200
|
020 |
|
|
|a 9788770220293
|q (electronic book)
|
020 |
|
|
|a 8770220298
|q (electronic book)
|
035 |
|
|
|a (OCoLC)1078997488
|z (OCoLC)1078947200
|
050 |
|
4 |
|a TK5105.8857
|b .B36 2018
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.678
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Banafa, Ahmed,
|e author.
|
245 |
1 |
0 |
|a Secure and smart Internet of Things (IoT) :
|b using blockchain and AI /
|c Ahmed Banafa.
|
264 |
|
1 |
|a Denmark :
|b River Publishers,
|c [2018]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a River Publishers series in information science and technology
|
505 |
0 |
|
|a Front Cover; Half Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; RIVER PUBLISHERS SERIES IN INFORMATIONSCIENCE AND TECHNOLOGY; Title Page -- Secure and Smart Internet of Things (IoT) Using Blockchain and AI; Copyright Page; Contents; Foreword; Preface; List of Figures; List of Abbreviations; PART I -- What Is IoT?; Chapter 1 -- Internet of Things: The Third Wave?; 1.1 Advantages and Disadvantages of IoT; Chapter 2 -- The Industrial Internet of Things (IIoT): Challenges, Requirements and Benefits; 2.1 IIoT, IoT and M2M; 2.1.1 IIoT Challenges (Figure 2.1)
|
505 |
8 |
|
|a 2.1.2 IIoT Requirements (Figure 2.2)2.1.3 IIoT Benefits (Figure 2.3); 2.2 The Future of the Industrial Internet of Things; Chapter 3 -- Internet of Things:Security, Privacy and Safety; 3.1 IoT's Threats; 3.2 Threats Are Real; 3.3 What Can We Do; Chapter 4 -- Internet of Things: More than Smart "Things"; 4.1 Industrial Internet; 4.2 The IoT Value Chain; 4.3 Internet of Things Predictions; 4.4 Challenges Facing IoT; Chapter 5 -- Internet of Things: Myths and Facts; 5.1 IoT and Sensors; 5.2 IoT and Mobile Data; 5.3 IoT and the Volume of Data; 5.4 IoT and Datacenters; 5.5 IoT is a Future Technology
|
505 |
8 |
|
|a 5.6 IoT and Current Interoperability Standards5.7 IoT and Privacy & Security; 5.8 IoT and Limited Vendors; 5.9 Conclusion; PART II -- IoT Implementation & Standardization Challenges; Chapter 6 -- Three Major Challenges Facing IoT; 6.1 Technology; 6.2 Technological Challenges; 6.3 Business; 6.4 Society; 6.5 Privacy; 6.6 Regulatory Standards; Chapter 7 -- IoT Implementation and Challenges; 7.1 Components of IoT Implementation; 7.1.1 Sensors; 7.1.2 Networks; 7.1.3 Standards; 7.1.4 Intelligent Analysis; 7.1.5 Intelligent Actions; Chapter 8 -- IoT Standardization and Implementation Challenges
|
505 |
8 |
|
|a 8.1 IoT Standardization8.2 IoT Implementation; 8.2.1 Sensors; 8.2.2 Networks; 8.2.3 Standards; 8.2.4 Intelligent Analysis; 8.2.5 Intelligent Actions; 8.3 The Road Ahead; Chapter 9 -- Challenges Facing IoT Analytics Success; 9.1 Data Structures; 9.2 Combining Multiple Data Formats; 9.3 The Need to Balance Scale and Speed; 9.4 IoT Analytics at the Edge; 9.5 IoT Analytics and AI; PART III -- Securing IoT; Chapter 10 -- How to Secure the Internet of Things; 10.1 Challenges to Secure IoT Deployments; 10.2 Dealing with the Challenges and Threats; 10.3 The Optimum Platform; 10.4 Last Word
|
505 |
8 |
|
|a Chapter 11 -- Using Blockchain to Secure IoT11.1 Challenges to Secure IoT Deployments; 11.2 Dealing with the Challenges and Threats; 11.3 The Optimum Platform; 11.4 Decentralizing IoT Networks; 11.5 The Blockchain Approach; 11.5.1 What is Blockchain?; 11.5.2 What are Some Advantages of Blockchain?; 11.5.3 How Does It Work?; 11.6 The Blockchain and IoT; Chapter 12 -- IoT and Blockchain: Challenges and Risks; 12.1 The Blockchain Model; 12.2 Principles of Blockchain Technology; 12.3 Public vs. Private Blockchain; 12.4 Challenges of Blockchain in IoT; 12.5 Risks of Using Blockchain in IoT
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a 12.6 The Optimum Secure IoT Model
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on February 05, 2019).
|
520 |
|
|
|a By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices"--Sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: * Internet of Things (IoT) * Industrial Internet of Things (IIoT) * Fog Computing * Artificial Intelligence * Blockchain Technology * Network Security * Zero-Trust Model * Data Analytics * Digital Transformation * DDoS * Smart Devices * Cybersecurity
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Internet of things.
|
650 |
|
0 |
|a Blockchains (Databases)
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
6 |
|a Internet des objets.
|
650 |
|
6 |
|a Chaînes de blocs.
|
650 |
|
6 |
|a Intelligence artificielle.
|
650 |
|
7 |
|a artificial intelligence.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Artificial intelligence
|2 fast
|
650 |
|
7 |
|a Blockchains (Databases)
|2 fast
|
650 |
|
7 |
|a Internet of things
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Banafa, Ahmed.
|t Secure and Smart Internet of Things (IoT) : Using Blockchain and AI.
|d Aalborg : River Publishers, ©2018
|
830 |
|
0 |
|a River Publishers series in information science and technology.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1982636
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 19574699
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40652005
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35793300
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5611047
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1982636
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15890387
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18126520
|
994 |
|
|
|a 92
|b IZTAP
|