Internet of Things Vulnerabilities and Recovery Strategies (eBook, ePUB)
Redaktion: Masoodi, Faheem Syeed; Hussain, Gousiya; Lattoo, Arif; Masoodi, Zubair; Charoo, Majid Ahmad; Bamhdi, Alwi
167,95 €
167,95 €
inkl. MwSt.
Sofort per Download lieferbar
167,95 €
Als Download kaufen
167,95 €
inkl. MwSt.
Sofort per Download lieferbar
Internet of Things Vulnerabilities and Recovery Strategies (eBook, ePUB)
Redaktion: Masoodi, Faheem Syeed; Hussain, Gousiya; Lattoo, Arif; Masoodi, Zubair; Charoo, Majid Ahmad; Bamhdi, Alwi
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book covers the prime requirements for a secure Internet of Things (IoT) setup. The book discusses security concerns of an IoT setup by uncovering the present challenges in standardization of data routing, data integrity, device supervision, IoT integration, information storage, IoT performance, and security solutions.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 9.93MB
Andere Kunden interessierten sich auch für
- Internet of Things Vulnerabilities and Recovery Strategies (eBook, PDF)167,95 €
- Sandip SenInnovative Technologies for Future Living (eBook, ePUB)26,95 €
- Mariya OuaissaOffensive and Defensive Cyber Security Strategies (eBook, ePUB)31,95 €
- Security and Privacy Trends in Cloud Computing and Big Data (eBook, ePUB)46,95 €
- Internet of Things and Cyber Physical Systems (eBook, ePUB)62,95 €
- Security Implementation in Internet of Medical Things (eBook, ePUB)52,95 €
- Security and Risk Analysis for Intelligent Cloud Computing (eBook, ePUB)52,95 €
-
-
-
The book covers the prime requirements for a secure Internet of Things (IoT) setup. The book discusses security concerns of an IoT setup by uncovering the present challenges in standardization of data routing, data integrity, device supervision, IoT integration, information storage, IoT performance, and security solutions.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 360
- Erscheinungstermin: 26. Juli 2024
- Englisch
- ISBN-13: 9781040025659
- Artikelnr.: 72272632
- Verlag: Taylor & Francis
- Seitenzahl: 360
- Erscheinungstermin: 26. Juli 2024
- Englisch
- ISBN-13: 9781040025659
- Artikelnr.: 72272632
Faheem Syeed Masoodi is an Assistant Professor in the Department of Computer Science, University of Kashmir. Earlier, he served College of Computer Science, University of Jizan, Saudi Arabia as an Assistant Professor. Alwi M. Bamhdi is an Associate Professor in the Department of Computer Sciences, Umm Al-Qura University, Saudi Arabia. He received his MSc and Ph.D. in computer science in 2014 from Heriot-Watt University, UK. Majid A.Charoo has worked as a technology consultant in Global Science & Technology Forum, Singapore and was an assistant professor in Al-Jouf University, Saudi Arabia in the department of Information Sciences. Zubair Sayeed Masoodi is an Assistant Professor and head of the Computer Applications Department at Government Degree College for Women Sopore, India. He is currently heading the Department of Computer Applications at this college. Arif Mohammad is a Lead Digital Engineer at Louis Dreyfus Company, The Netherlands. Gousiya Hussain is currently pursuing a PhD in Cloud Security from the Department of Computer Sciences, Mewar University, India.
1. The Internet of Things (IoT): A Cripple to Data Privacy and Security 2.
Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3.
Privacy Preservation in Cyber Physical Systems Using Entropy-Based
Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic
Methodologies 5. Security of IoT and Its Solutions 6. A Gradational
Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home
Devices 7. Managing and Securing Information Storage in Internet of Things
8. Mitigation of Internet of Things: Cloud Security Challenges by Using
Adaptive Security Principles 9. IoT Security with Blockchain Technology in
the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11.
Internet of Things: Security and Privacy Issues in IoT and Its Solutions
12. The Dark Side of Internet of Things in E-Commerce: Uncovering the
Misuse of Personal Information 13. Intrusion Detection in Home Automation
in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems
Performance Analysis 16. Privacy and Security Issues in Smart Homes in an
IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home
Automation
Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3.
Privacy Preservation in Cyber Physical Systems Using Entropy-Based
Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic
Methodologies 5. Security of IoT and Its Solutions 6. A Gradational
Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home
Devices 7. Managing and Securing Information Storage in Internet of Things
8. Mitigation of Internet of Things: Cloud Security Challenges by Using
Adaptive Security Principles 9. IoT Security with Blockchain Technology in
the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11.
Internet of Things: Security and Privacy Issues in IoT and Its Solutions
12. The Dark Side of Internet of Things in E-Commerce: Uncovering the
Misuse of Personal Information 13. Intrusion Detection in Home Automation
in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems
Performance Analysis 16. Privacy and Security Issues in Smart Homes in an
IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home
Automation
1. The Internet of Things (IoT): A Cripple to Data Privacy and Security 2.
Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3.
Privacy Preservation in Cyber Physical Systems Using Entropy-Based
Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic
Methodologies 5. Security of IoT and Its Solutions 6. A Gradational
Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home
Devices 7. Managing and Securing Information Storage in Internet of Things
8. Mitigation of Internet of Things: Cloud Security Challenges by Using
Adaptive Security Principles 9. IoT Security with Blockchain Technology in
the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11.
Internet of Things: Security and Privacy Issues in IoT and Its Solutions
12. The Dark Side of Internet of Things in E-Commerce: Uncovering the
Misuse of Personal Information 13. Intrusion Detection in Home Automation
in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems
Performance Analysis 16. Privacy and Security Issues in Smart Homes in an
IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home
Automation
Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3.
Privacy Preservation in Cyber Physical Systems Using Entropy-Based
Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic
Methodologies 5. Security of IoT and Its Solutions 6. A Gradational
Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home
Devices 7. Managing and Securing Information Storage in Internet of Things
8. Mitigation of Internet of Things: Cloud Security Challenges by Using
Adaptive Security Principles 9. IoT Security with Blockchain Technology in
the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11.
Internet of Things: Security and Privacy Issues in IoT and Its Solutions
12. The Dark Side of Internet of Things in E-Commerce: Uncovering the
Misuse of Personal Information 13. Intrusion Detection in Home Automation
in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems
Performance Analysis 16. Privacy and Security Issues in Smart Homes in an
IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home
Automation