Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

IoT Applications, Security Threats, and Countermeasures, Nayak Padmalaya, Ray Niranjan, Ravichandran P.


Варианты приобретения
Цена: 24499.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Nayak Padmalaya, Ray Niranjan, Ravichandran P.
Название:  IoT Applications, Security Threats, and Countermeasures
ISBN: 9780367491857
Издательство: Taylor&Francis
Классификация:



ISBN-10: 0367491850
Обложка/Формат: Hardcover
Страницы: 261
Вес: 0.57 кг.
Дата издания: 03.09.2021
Серия: Internet of everything ioe
Язык: English
Иллюстрации: 31 tables, black and white; 88 line drawings, black and white; 28 halftones, black and white; 116 illustrations, black and white
Размер: 23.39 x 15.60 x 1.75 cm
Читательская аудитория: Professional & vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание: The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture


Fog/Edge Computing for Security, Privacy, and Applications

Автор: Chang Wei, Wu Jie
Название: Fog/Edge Computing for Security, Privacy, and Applications
ISBN: 3030573273 ISBN-13(EAN): 9783030573270
Издательство: Springer
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Part I: Overview of Fog/Edge Computing

1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"

Khaldoon Alshouiliy (University of Cincinnati, USA)

Dharma Agrawal (University of Cincinnati, USA)

2. "An overview of the Edge Computing in Modern Digital Age"

Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)

Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)

Rangel Arthur (University of Campinas- UNICAMP, Brazil)

Yuzo Lano (University of Campinas- UNICAMP, Brazil)

Part II: Security in Fog/Edge Computing

3. "Secure Search and Storage Services in Fog/Edge Computing"

Qin Liu (Hunan University, China)

4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"

Abebe Diro (La Trobe University, Australia)

Abdun Mahmood (La Trobe University, Australia)

Naveen Chilamkurti (La Trobe University, Australia)

5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"

Ali Shoker (VORTEX Colab, Portugal)

Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)

Part III: Privacy in Fog/Edge Computing

6. "Privacy Issues in Edge Computing"

Qi Xia (College of William and Mary, USA)

Zeyi Tao (College of William and Mary, USA)

Qun Li (College of William and Mary, USA)

7. "Privacy-preserving Edge Video Analytics"

Miao Hu (Sun Yat-sen University, China)

Yao Fu (Sun Yat-sen University, China)

Di Wu (Sun Yat-sen University, China)

Part IV: Architectural Design in Fog/Edge Computing

8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"

Nhu-Ngoc Dao (Sejong University, South Korea)

Ngoc-Thanh Dinh (Soongsil University, South Korea)

Quoc-Viet Pham (Pusan National University, South Korea)

Trung V. Phan (Technische Universitдt Chemnitz, Germany)

Sungrae Cho (Chung-Ang University, South Korea)

Torsten Braun (University of Bern, Switzerland)

9. "Security and Intelligent Management for Fog/Edge Computing Resources"

Jun Wu (Shanghai Jiao Tong University, China)

10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"

Zichuan Xu (Dalian University of Technology, China)

Weifa Liang (The Australian National University, Australia)

11. "Blockchain-based Security Services for Fog Computing"

Arvind Kiwelekar (Dr. Babasaheb Ambedkar Technological University, India)

Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India

Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)

Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)

Part V: Applications of Fog/Edge Computing

12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"

G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)

Vinay Chamola (BITS Pilani, Pilani Campus,

Data and Applications Security and Privacy XXX

Автор: Ranise
Название: Data and Applications Security and Privacy XXX
ISBN: 3319414828 ISBN-13(EAN): 9783319414829
Издательство: Springer
Рейтинг:
Цена: 10482.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 30th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016.

Applications and Techniques in Information Security

Автор: Qingfeng Chen; Jia Wu; Shichao Zhang; Changan Yuan
Название: Applications and Techniques in Information Security
ISBN: 9811329060 ISBN-13(EAN): 9789811329067
Издательство: Springer
Рейтинг:
Цена: 9502.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.

Computer Applications for Security, Control and System Engineering

Автор: Tai-hoon Kim; Adrian Stoica; Wai-chi Fang; Thanos
Название: Computer Applications for Security, Control and System Engineering
ISBN: 3642352634 ISBN-13(EAN): 9783642352638
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation;

Information Security Applications

Автор: Ho-won Kim; Dooho Choi
Название: Information Security Applications
ISBN: 3319318748 ISBN-13(EAN): 9783319318745
Издательство: Springer
Рейтинг:
Цена: 8944.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume werecarefully reviewed and selected from 78 submissions.

Memristor Technology: Synthesis and Modeling for Sensing and Security Applications

Автор: Heba Abunahla; Baker Mohammad
Название: Memristor Technology: Synthesis and Modeling for Sensing and Security Applications
ISBN: 3319880837 ISBN-13(EAN): 9783319880839
Издательство: Springer
Рейтинг:
Цена: 16769.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book provides readers with a single-source guide to fabricate, characterize and model memristor devices for sensing applications.  The authors describe a correlated, physics-based model to simulate and predict the behavior of devices fabricated with different oxide materials, active layer thickness, and operating temperature.  They discuss memristors from various perspectives, including working mechanisms, different synthesis methods, characterization procedures, and device employment in radiation sensing and security applications.

Security Risk Assessment: In the Chemical and Process Industry

Автор: Genserik Reniers, Nima Khakzad, Pieter Van Gelder
Название: Security Risk Assessment: In the Chemical and Process Industry
ISBN: 3110500523 ISBN-13(EAN): 9783110500523
Издательство: Walter de Gruyter
Цена: 22305.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book deals with the state-of-the-art of physical security knowledge and research in the chemical and process industries. Legislation differences between Europe and the USA are investigated, followed by an overview of the how, what and why of contemporary security risk assessment in this particular industrial sector. Innovative solutions such as attractiveness calculations and the use of game theory, advancing the present science of adversarial risk analysis, are discussed. The book further stands up for developing and employing dynamic security risk assessments, for instance based on Bayesian networks, and using OR methods to truly move security forward in the chemical and process industries.

Applications of Cryptography and Network Security

Автор: Mason Stephen
Название: Applications of Cryptography and Network Security
ISBN: 1632400650 ISBN-13(EAN): 9781632400659
Издательство: Неизвестно
Цена: 24131.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Information Security Applications

Автор: Yongdae Kim; Heejo Lee; Adrian Perrig
Название: Information Security Applications
ISBN: 3319051482 ISBN-13(EAN): 9783319051482
Издательство: Springer
Рейтинг:
Цена: 8803.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Advanced Technologies for Security Applications: Proceedings of the NATO Science for Peace and Security `cluster Workshop on Advanced Technologies`, 1

Автор: Palestini Claudio
Название: Advanced Technologies for Security Applications: Proceedings of the NATO Science for Peace and Security `cluster Workshop on Advanced Technologies`, 1
ISBN: 9402420207 ISBN-13(EAN): 9789402420203
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: On 17-18 September 2019, the SPS Programme gathered at the KU Leuven University a wide number of researchers from a selection of on-going and recently closed SPS projects in the field of security-related advanced technologies for a "Cluster Workshop on Advanced Technologies".

Data and Applications Security and Privacy XXVII

Автор: Lingyu Wang; Basit Shafiq
Название: Data and Applications Security and Privacy XXVII
ISBN: 3642392555 ISBN-13(EAN): 9783642392559
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.

Introduction to machine learning with applications in information security

Автор: Stamp, Mark
Название: Introduction to machine learning with applications in information security
ISBN: 0367573059 ISBN-13(EAN): 9780367573058
Издательство: Taylor&Francis
Рейтинг:
Цена: 6430.00 р.
Наличие на складе: Нет в наличии.

Описание: This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information security. The book will cover malware detection, cryptography, and intrusion detection. The book will be relevant for students in machine learning and computer security courses.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия