Security and privacy in internet of things (IoTs) : models, algorithms, and implementations / Fei Hu.
Tipo de material: TextoEditor: Boca Raton FL, CRC Press ; Taylos & Francis Group , 2016Descripción: 584 páginas : ilustracionesISBN: 9781498723190Tema(s): Internet de las cosas -- Seguridad | Seguridad Redes | Medidas de seguridad de redes informáticasClasificación CDD: 004.6784
Contenidos:
Resumen: The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. This book brings together IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects.
Section 1. Threats and attacks.-- Section 2. Privacy preservation.-- Section 3. Trust and authentication.-- Section 4. IoT data security.--
Section 5. Social awareness.
Tipo de ítem | Ubicación actual | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|
Libros | Biblioteca Central CIENCIAS PURAS | 004.6784 H874s (Navegar estantería) | Ej.1 | En catalogación Procesos técnicos | B0155 |
Navegando Biblioteca Central Estantes, Ubicación: CIENCIAS PURAS Cerrar el navegador de estanterías
004.6782 H81d Distributed and cloud computing : | 004.6782 SA11c Cloud Capacity Management / | 004.6782 Y43b Building the Infrastructure for cloud security: | 004.6784 H874s Security and privacy in internet of things (IoTs) : models, algorithms, and implementations / | 005.0684 B739p Programming for the internet of things : using Windows 10 IoT core and Azure IoT / | 005.1 / P93i Ingeniería del software : Un enfoque practico | 005.1 / P93i Ingeniería del software : Un enfoque practico |
Contiene: Índice.
Section 1. Threats and attacks.-- Section 2. Privacy preservation.-- Section 3. Trust and authentication.-- Section 4. IoT data security.--
Section 5. Social awareness.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. This book brings together IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects.
No hay comentarios en este titulo.