Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Security Challenges and Approaches in Internet of Things, Misra


Варианты приобретения
Цена: 7685.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Misra
Название:  Security Challenges and Approaches in Internet of Things
ISBN: 9783319442297
Издательство: Springer
Классификация:



ISBN-10: 3319442295
Обложка/Формат: Paperback
Страницы: 107
Вес: 0.19 кг.
Дата издания: 2017
Серия: SpringerBriefs in Electrical and Computer Engineering
Язык: English
Издание: 1st ed. 2017
Иллюстрации: 23 illustrations, color; 4 illustrations, black and white; vi, 107 p. 27 illus., 23 illus. in color.
Размер: 234 x 156 x 6
Читательская аудитория: Professional & vocational
Основная тема: Electrical Engineering
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.
Дополнительное описание: Introduction.- Motivation.- System Model for the Internet of Things.- Vulnerable Features and Threats.- Securing the Internet of Things.- Security Approaches in Internet of Things.- Conclusion.



Internet of things (IOT) in 5g mobile technologies.

Название: Internet of things (IOT) in 5g mobile technologies.
ISBN: 3319309110 ISBN-13(EAN): 9783319309118
Издательство: Springer
Рейтинг:
Цена: 22359.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Byproviding researchers and professionals with a timely snapshot of emergingmobile communication systems, and highlighting the main pitfalls and potentialsolutions, the book fills an important gap in the literature and will fosterthe further developments of 5G hosting IoT devices.

Impacts and Risk Assessment of Technology for Internet Security

Автор: Charles A. Shoniregun
Название: Impacts and Risk Assessment of Technology for Internet Security
ISBN: 1461498910 ISBN-13(EAN): 9781461498919
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

Internet of Things

Автор: Benny Mandler; Johann Barja; Miguel Elias Mitre Ca
Название: Internet of Things
ISBN: 3319470744 ISBN-13(EAN): 9783319470740
Издательство: Springer
Рейтинг:
Цена: 10342.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.

Securing Cyber-Physical Systems

Название: Securing Cyber-Physical Systems
ISBN: 1498700985 ISBN-13(EAN): 9781498700986
Издательство: Taylor&Francis
Рейтинг:
Цена: 19140.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry.

CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical--their availability and correct operation is essential. This book focuses on the security of such mission-critical systems.

Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including:

  • Securing modern electrical power systems
  • Using moving target defense (MTD) techniques to secure CPS
  • Securing wireless sensor networks (WSNs) used for critical infrastructures
  • Mechanisms to improve cybersecurity and privacy in transportation CPS
  • Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles
  • Security issues, vulnerabilities, and challenges in the Internet of Things
  • Machine-to-machine (M2M) communication security
  • Security of industrial control systems
  • Designing "trojan-resilient" integrated circuits

While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Internet-Security aus Software-Sicht

Автор: Kriha, Walter, Schmitz, Roland
Название: Internet-Security aus Software-Sicht
ISBN: 3540222235 ISBN-13(EAN): 9783540222231
Издательство: Springer
Рейтинг:
Цена: 7438.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Web Security

Автор: Wu
Название: Web Security
ISBN: 1466592613 ISBN-13(EAN): 9781466592612
Издательство: Taylor&Francis
Рейтинг:
Цена: 13779.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия