Securing the internet of things: concepts, methodologies, tools, and applications
"This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source s...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2020]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 DE-83 DE-898 URL des Erstveröffentlichers |
Zusammenfassung: | "This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"-- |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522598671 |
DOI: | 10.4018/978-1-5225-9866-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046197558 | ||
003 | DE-604 | ||
005 | 20211110 | ||
007 | cr|uuu---uuuuu | ||
008 | 191014s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781522598671 |9 978-1-5225-9867-1 | ||
035 | |a (OCoLC)1124792551 | ||
035 | |a (DE-599)BVBBV046197558 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 |a DE-83 |a DE-898 | ||
245 | 1 | 0 | |a Securing the internet of things |b concepts, methodologies, tools, and applications |c Information Resources Management Association, USA |
264 | 1 | |a Hershey, PA |b IGI Global |c [2020] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Security in context of the Internet of Things : a study / Mohammad Tariq Banday | |
520 | |a "This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"-- | ||
650 | 4 | |a Internet of things / Security measures | |
710 | 2 | |a Information Resources Management Association |0 (DE-588)5010976-5 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-9866-4 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-9866-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-9866-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9866-4 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9866-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-9866-4 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805076697529188352 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV046197558 |
collection | ZDB-98-IGB |
contents | Security in context of the Internet of Things : a study / Mohammad Tariq Banday |
ctrlnum | (OCoLC)1124792551 (DE-599)BVBBV046197558 |
doi_str_mv | 10.4018/978-1-5225-9866-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046197558</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211110</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191014s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522598671</subfield><subfield code="9">978-1-5225-9867-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1124792551</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046197558</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the internet of things</subfield><subfield code="b">concepts, methodologies, tools, and applications</subfield><subfield code="c">Information Resources Management Association, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Security in context of the Internet of Things : a study / Mohammad Tariq Banday</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things / Security measures</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Information Resources Management Association</subfield><subfield code="0">(DE-588)5010976-5</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-9866-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-9866-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9866-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9866-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9866-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-9866-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046197558 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:01:25Z |
institution | BVB |
institution_GND | (DE-588)5010976-5 |
isbn | 9781522598671 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031576784 |
oclc_num | 1124792551 |
open_access_boolean | |
owner | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
owner_facet | DE-1050 DE-706 DE-83 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-98-IGB FHD01_IGB_Kauf ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
spelling | Securing the internet of things concepts, methodologies, tools, and applications Information Resources Management Association, USA Hershey, PA IGI Global [2020] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Security in context of the Internet of Things : a study / Mohammad Tariq Banday "This book examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. It highlights a range of topics such as cloud security, threat detection, and open source software"-- Internet of things / Security measures Information Resources Management Association (DE-588)5010976-5 isb Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-9866-4 https://doi.org/10.4018/978-1-5225-9866-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Securing the internet of things concepts, methodologies, tools, and applications Security in context of the Internet of Things : a study / Mohammad Tariq Banday Internet of things / Security measures |
title | Securing the internet of things concepts, methodologies, tools, and applications |
title_auth | Securing the internet of things concepts, methodologies, tools, and applications |
title_exact_search | Securing the internet of things concepts, methodologies, tools, and applications |
title_full | Securing the internet of things concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_fullStr | Securing the internet of things concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_full_unstemmed | Securing the internet of things concepts, methodologies, tools, and applications Information Resources Management Association, USA |
title_short | Securing the internet of things |
title_sort | securing the internet of things concepts methodologies tools and applications |
title_sub | concepts, methodologies, tools, and applications |
topic | Internet of things / Security measures |
topic_facet | Internet of things / Security measures |
url | https://doi.org/10.4018/978-1-5225-9866-4 |
work_keys_str_mv | AT informationresourcesmanagementassociation securingtheinternetofthingsconceptsmethodologiestoolsandapplications |