Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Mastering IoT with Low Power Wireless Solutions, Christopher Kocks


Варианты приобретения
Цена: 11157.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Christopher Kocks
Название:  Mastering IoT with Low Power Wireless Solutions
ISBN: 9781501515910
Издательство: Walter de Gruyter
Классификация:





ISBN-10: 1501515918
Обложка/Формат: Paperback
Страницы: 250
Вес: 0.46 кг.
Дата издания: 02.09.2019
Серия: Economics/Business/Finance
Язык: English
Иллюстрации: 5 tables, black and white; 25 illustrations, black and white
Размер: H 240 X W 170
Читательская аудитория: Professional and scholarly
Ключевые слова: Impact of science & technology on society,Computer networking & communications, BUSINESS & ECONOMICS / Industries / Computers & Information Technology,COMPUTERS / Information Technology,COMPUTERS / Networking / Local Area Networks (LANs),COMPUTERS / Secu
Рейтинг:
Поставляется из: Германии
Описание: The rapid growth of IoT has been remarkable considering large dependence upon short range, local area networks, and antiquated cellular networks for longer range. One of the key changes enabling an explosion of IoT solutions is the deployment of LPWAN (low power wide area network) with accessibility measured in kilometers rather than meters. Greater ranges open the flood gates to more comprehensive hybrid solutions that are driving smart city, business, automotive, and industrial connected initiatives. Mastering IoT with Low Power Wireless Solutions provides an in depth look at the technologies certain to have an impact on IoT in the future. How will operators be positioned as key players in this new ecosystem? What are the use cases and value that will be enabled with LPWAN? What are the advantages over similar 5G cellular solutions being developed? Which platforms provide the most promise? Readers will see real examples of LPWAN use cases and how operators will drive the next wave of evolution in IoT. This book will share approaches and examples on how to derive the greatest value.?


Secure and Smart Internet of Things (Iot): Using Blockchain and AI

Автор: Banafa Ahmed
Название: Secure and Smart Internet of Things (Iot): Using Blockchain and AI
ISBN: 8770220301 ISBN-13(EAN): 9788770220309
Издательство: Taylor&Francis
Рейтинг:
Цена: 13320.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled.This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology.

Defending IoT Infrastructures with the Raspberry Pi

Автор: Hosmer
Название: Defending IoT Infrastructures with the Raspberry Pi
ISBN: 1484236998 ISBN-13(EAN): 9781484236994
Издательство: Springer
Рейтинг:
Цена: 4611.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Iot security issues

Автор: Gilchrist, Alasdair
Название: Iot security issues
ISBN: 1501514741 ISBN-13(EAN): 9781501514746
Издательство: Walter de Gruyter
Рейтинг:
Цена: 6322.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things.

This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained.

The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

Role Of Blockchain Technology In Iot Applications,115

Автор: Kim, Shiho
Название: Role Of Blockchain Technology In Iot Applications,115
ISBN: 0128171898 ISBN-13(EAN): 9780128171899
Издательство: Elsevier Science
Рейтинг:
Цена: 24086.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Role of Blockchain Technology in IoT Applications, Volume 115 in the Advances in Computers series, reviews the latest information on this topic that promises many applications in human life. According to forecasts made by various market research/survey agencies, there will be around 50 Billion connected devices (IoT) by 2020. Updates in this new release include chapters on the Technical Aspects of Blockchain and IoT, Integrated Platforms for Blockchain-Enablement, Intersections Between IoT and Distributed Ledger, Blockchain and Artificial Intelligence: How and Why Combining These Two Groundbreaking Technologies, Blockchain Applications in Health Care and Opportunities and Advancements Due to New Information Technology Frameworks, and more.

Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT

Автор: Wiem Tounsi
Название: Cyber–Vigilance and Digital Trust: Cybersecurity in the Era of Cloud Computing and IoT
ISBN: 1786304481 ISBN-13(EAN): 9781786304483
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead.

Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

The Iot Hacker`s Handbook: A Practical Guide to Hacking the Internet of Things

Автор: Gupta Aditya
Название: The Iot Hacker`s Handbook: A Practical Guide to Hacking the Internet of Things
ISBN: 1484242998 ISBN-13(EAN): 9781484242995
Издательство: Springer
Рейтинг:
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
What You’ll Learn
Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee
Who This Book is For
Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions

Автор: Wright Joshua, Cache Johnny
Название: Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
ISBN: 0071827633 ISBN-13(EAN): 9780071827638
Издательство: McGraw-Hill
Рейтинг:
Цена: 11324.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.

Build Your Own Cybersecurity Testing Lab: Low-cost Solutions

Автор: Messier Ric
Название: Build Your Own Cybersecurity Testing Lab: Low-cost Solutions
ISBN: 1260458318 ISBN-13(EAN): 9781260458312
Издательство: McGraw-Hill
Рейтинг:
Цена: 6691.00 р.
Наличие на складе: Поставка под заказ.

Описание: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Manage your own robust, inexpensive cybersecurity testing environment

This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments fully explains multiple techniques for developing lab systems, including the use of Infrastructure-as-Code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Written by a seasoned IT security professional and academic, this book offers complete coverage of cloud and virtual environments as well as physical networks and automation. Included with the book is access to videos that demystify difficult concepts.

Inside, you will discover how to:

    - Gather network requirements and build your cybersecurity testing lab
    - Set up virtual machines and physical systems from inexpensive components
    - Select and configure the necessary operating systems
    - Gain remote access through SSH, RDP, and other remote access protocols
    - Efficiently isolate subnets with physical switches, routers, and VLANs
    - Analyze the vulnerabilities and challenges of cloud-based infrastructures
    - Handle implementation of systems on Amazon Web Services, Microsoft Azure, and Google Cloud Engine
    - Maximize consistency and repeatability using the latest automation tools



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия