Secure Communication in Internet of Things (eBook, ePUB)
Emerging Technologies, Challenges, and Mitigation
Redaktion: Kavitha, T.; Srikanth, Prasidh; Subashini, V. J.; Sandhya, M. K.
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Secure Communication in Internet of Things (eBook, ePUB)
Emerging Technologies, Challenges, and Mitigation
Redaktion: Kavitha, T.; Srikanth, Prasidh; Subashini, V. J.; Sandhya, M. K.
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 15.89MB
Andere Kunden interessierten sich auch für
- Secure Communication in Internet of Things (eBook, PDF)52,95 €
- Applications of Computational Intelligence Techniques in Communications (eBook, ePUB)52,95 €
- Internet of Drones (eBook, ePUB)52,95 €
- Gunneswara Vsss Kalaga RaoDesign of Internet of Things (eBook, ePUB)48,95 €
- Internet of Things enabled Machine Learning for Biomedical Applications (eBook, ePUB)52,95 €
- Artificial Intelligence and Machine Learning for Smart Community (eBook, ePUB)52,95 €
- Artificial Intelligence and Communication Techniques in Industry 5.0 (eBook, ePUB)52,95 €
-
-
-
This book will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 360
- Erscheinungstermin: 23. Mai 2024
- Englisch
- ISBN-13: 9781040025147
- Artikelnr.: 70385798
- Verlag: Taylor & Francis
- Seitenzahl: 360
- Erscheinungstermin: 23. Mai 2024
- Englisch
- ISBN-13: 9781040025147
- Artikelnr.: 70385798
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
T. Kavitha is working as a Professor in the Department of Computer Engineering, New Horizon College of Engineering, Visvesvaraya Technological University, Karnataka, India. M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India. V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India. Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.
Chapter 1. Introduction to Internet of Things Security. Chapter 2. IoT
Hardware, Platform and Security Protocols. Chapter 3. Secure Device
Management and Device Attestation in IoT. Chapter 4. Secure Operating
Systems and Software. Chapter 5. Wireless Physical Layer Security. Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter 7. Secure data collection, aggregation, and sharing in the Internet
of Things. Chapter 8. Authentication, Authorization and Anonymization
techniques in the IoT. Chapter 9. Secure Identity, Access, and Mobility
Management in the Internet of Things. Chapter 10. Privacy-preserving scheme
for Internet of Things. Chapter 11. Trust Establishment Models in IoT.
Chapter 12. Secure communication protocols for the IoT. Chapter 13.
Adaptive Security in the Internet of Things.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate
and cross-layer IoT security Design. Chapter 16. Edge computing technology
for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT
Security using Blockchain. Chapter 19. IoT ecosystem-level security
auditing, analysis, and Recovery. Chapter 20. Risk Assessment and
Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack
Strategies in the Internet of Things. Chapter 22. Security and Privacy
Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their
mitigation with SDN and other techniques. Chapter 24. Intrusion & malware
detection and prevention techniques in IoT. Chapter 25. 5G and 6G security
issues and countermeasures.
Hardware, Platform and Security Protocols. Chapter 3. Secure Device
Management and Device Attestation in IoT. Chapter 4. Secure Operating
Systems and Software. Chapter 5. Wireless Physical Layer Security. Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter 7. Secure data collection, aggregation, and sharing in the Internet
of Things. Chapter 8. Authentication, Authorization and Anonymization
techniques in the IoT. Chapter 9. Secure Identity, Access, and Mobility
Management in the Internet of Things. Chapter 10. Privacy-preserving scheme
for Internet of Things. Chapter 11. Trust Establishment Models in IoT.
Chapter 12. Secure communication protocols for the IoT. Chapter 13.
Adaptive Security in the Internet of Things.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate
and cross-layer IoT security Design. Chapter 16. Edge computing technology
for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT
Security using Blockchain. Chapter 19. IoT ecosystem-level security
auditing, analysis, and Recovery. Chapter 20. Risk Assessment and
Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack
Strategies in the Internet of Things. Chapter 22. Security and Privacy
Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their
mitigation with SDN and other techniques. Chapter 24. Intrusion & malware
detection and prevention techniques in IoT. Chapter 25. 5G and 6G security
issues and countermeasures.
Chapter 1. Introduction to Internet of Things Security. Chapter 2. IoT
Hardware, Platform and Security Protocols. Chapter 3. Secure Device
Management and Device Attestation in IoT. Chapter 4. Secure Operating
Systems and Software. Chapter 5. Wireless Physical Layer Security. Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter 7. Secure data collection, aggregation, and sharing in the Internet
of Things. Chapter 8. Authentication, Authorization and Anonymization
techniques in the IoT. Chapter 9. Secure Identity, Access, and Mobility
Management in the Internet of Things. Chapter 10. Privacy-preserving scheme
for Internet of Things. Chapter 11. Trust Establishment Models in IoT.
Chapter 12. Secure communication protocols for the IoT. Chapter 13.
Adaptive Security in the Internet of Things.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate
and cross-layer IoT security Design. Chapter 16. Edge computing technology
for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT
Security using Blockchain. Chapter 19. IoT ecosystem-level security
auditing, analysis, and Recovery. Chapter 20. Risk Assessment and
Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack
Strategies in the Internet of Things. Chapter 22. Security and Privacy
Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their
mitigation with SDN and other techniques. Chapter 24. Intrusion & malware
detection and prevention techniques in IoT. Chapter 25. 5G and 6G security
issues and countermeasures.
Hardware, Platform and Security Protocols. Chapter 3. Secure Device
Management and Device Attestation in IoT. Chapter 4. Secure Operating
Systems and Software. Chapter 5. Wireless Physical Layer Security. Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter 7. Secure data collection, aggregation, and sharing in the Internet
of Things. Chapter 8. Authentication, Authorization and Anonymization
techniques in the IoT. Chapter 9. Secure Identity, Access, and Mobility
Management in the Internet of Things. Chapter 10. Privacy-preserving scheme
for Internet of Things. Chapter 11. Trust Establishment Models in IoT.
Chapter 12. Secure communication protocols for the IoT. Chapter 13.
Adaptive Security in the Internet of Things.
Chapter 14. Covert Communication security methods. Chapter 15. Clean-slate
and cross-layer IoT security Design. Chapter 16. Edge computing technology
for secure IoT. Chapter 17. Cloud Security for the IoT. Chapter 18. IoT
Security using Blockchain. Chapter 19. IoT ecosystem-level security
auditing, analysis, and Recovery. Chapter 20. Risk Assessment and
Vulnerability Analysis in the IoT. Chapter 21. Threat Models and Attack
Strategies in the Internet of Things. Chapter 22. Security and Privacy
Issues in IoT. Chapter 23. Vulnerabilities in Internet of Things and their
mitigation with SDN and other techniques. Chapter 24. Intrusion & malware
detection and prevention techniques in IoT. Chapter 25. 5G and 6G security
issues and countermeasures.