Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart…mehr
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.
Dr. Ajay Prasad is Professor in the Informatics Cluster at the University of Petroleum and Energy Studies, Dehradun, India. He specializes in computer architecture, simulation, and modelling, network/data security principles, system programming, cloud systems, compilers, and digital forensics. His research contribution is towards fine-grained centralized monitoring in cloud computing and many allied areas of security and others. His research interests are in the area of security and digital forensics and security issues in IoT. Dr. Thipendra P Singh is currently serving as Dean (ACademic Affairs) and Professor of Computer Science at Bennett University, Greater Noida, NCR, India. He holds a Doctorate in Computer Science from Jamia Millia Islamia University, New Delhi. His research interests include machine intelligence, pattern recognition, and the development of hybrid intelligent systems. He is an author of around 20 books and more than 50 researchpapers in these areas. Dr. Samidha Dwivedi Sharma is Assistant Professor in the Department of Information Technology, College of Computing and Informatics, at Saudi Electronic University, Saudi Arabia. Her research interests span both mobile computing and database management systems. Much of her work has been on improving the understanding, design, and performance of mobile and networked computer systems, mainly through the application of data mining, statistics, and performance evaluation.
Inhaltsangabe
1. IoT Communication models and technology requirements.- 2. Security challenges in IoT.- 3. Communication Technology in IoT: The threat models.- 4. IoT Sensors and Models of Communication.- 5. Securing IoT applications.- 6. IPv6: strengths and limitations.- 7. IP Based Communication in IoT: Handling Security Challenges.- 8. Non-IP Based Communication in IoT: Handling Security Challenges.- 9. Low Power Communication systems: addressing security issues.- 10. Long-Range Communication Systems: addressing security issues.- 11. Security Issues and Its Countermeasures in Cloud-based IoT.- 12. Communication mechanisms in IoT Domains: Security threats and countermeasures.- 13. RFID and NFC technology protocols and challenges.- 14. Evolving Wireless protocols and their security aspects.
1. IoT Communication models and technology requirements.- 2. Security challenges in IoT.- 3. Communication Technology in IoT: The threat models.- 4. IoT Sensors and Models of Communication.- 5. Securing IoT applications.- 6. IPv6: strengths and limitations.- 7. IP Based Communication in IoT: Handling Security Challenges.- 8. Non-IP Based Communication in IoT: Handling Security Challenges.- 9. Low Power Communication systems: addressing security issues.- 10. Long-Range Communication Systems: addressing security issues.- 11. Security Issues and Its Countermeasures in Cloud-based IoT.- 12. Communication mechanisms in IoT Domains: Security threats and countermeasures.- 13. RFID and NFC technology protocols and challenges.- 14. Evolving Wireless protocols and their security aspects.
1. IoT Communication models and technology requirements.- 2. Security challenges in IoT.- 3. Communication Technology in IoT: The threat models.- 4. IoT Sensors and Models of Communication.- 5. Securing IoT applications.- 6. IPv6: strengths and limitations.- 7. IP Based Communication in IoT: Handling Security Challenges.- 8. Non-IP Based Communication in IoT: Handling Security Challenges.- 9. Low Power Communication systems: addressing security issues.- 10. Long-Range Communication Systems: addressing security issues.- 11. Security Issues and Its Countermeasures in Cloud-based IoT.- 12. Communication mechanisms in IoT Domains: Security threats and countermeasures.- 13. RFID and NFC technology protocols and challenges.- 14. Evolving Wireless protocols and their security aspects.
1. IoT Communication models and technology requirements.- 2. Security challenges in IoT.- 3. Communication Technology in IoT: The threat models.- 4. IoT Sensors and Models of Communication.- 5. Securing IoT applications.- 6. IPv6: strengths and limitations.- 7. IP Based Communication in IoT: Handling Security Challenges.- 8. Non-IP Based Communication in IoT: Handling Security Challenges.- 9. Low Power Communication systems: addressing security issues.- 10. Long-Range Communication Systems: addressing security issues.- 11. Security Issues and Its Countermeasures in Cloud-based IoT.- 12. Communication mechanisms in IoT Domains: Security threats and countermeasures.- 13. RFID and NFC technology protocols and challenges.- 14. Evolving Wireless protocols and their security aspects.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497