Smart and agile cybersecurity for IoT and IIoT environments:
The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophi...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2024
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-898 DE-1050 Volltext |
Zusammenfassung: | The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets.Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively. |
Beschreibung: | 1 Online-Ressource (423 Seiten) |
ISBN: | 9798369334522 |
DOI: | 10.4018/979-8-3693-3451-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049817756 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240813s2024 xx o|||| 00||| eng d | ||
020 | |a 9798369334522 |9 9798369334522 | ||
024 | 7 | |a 10.4018/979-8-3693-3451-5 |2 doi | |
035 | |a (ZDB-98-IGB)00335914 | ||
035 | |a (OCoLC)1454742382 | ||
035 | |a (DE-599)BVBBV049817756 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 005.8 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Smart and agile cybersecurity for IoT and IIoT environments |c Qasem Abu Al-Haija, editor |
246 | 1 | 3 | |a Smart and agile cybersecurity for internet of things and industrial internet of things environments |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2024 | |
300 | |a 1 Online-Ressource (423 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets.Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively. | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Internet of things | |
700 | 1 | |a Al-Haija, Qasem Abu |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9798369334515 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-3451-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035157996 | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3451-5 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3451-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-3451-5 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715327112937472 |
---|---|
adam_text | |
any_adam_object | |
author2 | Al-Haija, Qasem Abu |
author2_role | edt |
author2_variant | q a a h qaa qaah |
author_facet | Al-Haija, Qasem Abu |
building | Verbundindex |
bvnumber | BV049817756 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00335914 (OCoLC)1454742382 (DE-599)BVBBV049817756 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/979-8-3693-3451-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049817756</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240813s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369334522</subfield><subfield code="9">9798369334522</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-3451-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00335914</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1454742382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049817756</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Smart and agile cybersecurity for IoT and IIoT environments</subfield><subfield code="c">Qasem Abu Al-Haija, editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Smart and agile cybersecurity for internet of things and industrial internet of things environments</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (423 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets.Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Haija, Qasem Abu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798369334515</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-3451-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035157996</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3451-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3451-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-3451-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049817756 |
illustrated | Not Illustrated |
indexdate | 2024-12-17T19:01:36Z |
institution | BVB |
isbn | 9798369334522 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035157996 |
oclc_num | 1454742382 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (423 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Smart and agile cybersecurity for IoT and IIoT environments Qasem Abu Al-Haija, editor Smart and agile cybersecurity for internet of things and industrial internet of things environments Hershey, Pennsylvania IGI Global 2024 1 Online-Ressource (423 Seiten) txt rdacontent c rdamedia cr rdacarrier The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets.Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively. Computer networks Security measures Computer security Data protection Internet of things Al-Haija, Qasem Abu edt Erscheint auch als Druck-Ausgabe 9798369334515 https://doi.org/10.4018/979-8-3693-3451-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Smart and agile cybersecurity for IoT and IIoT environments Computer networks Security measures Computer security Data protection Internet of things |
title | Smart and agile cybersecurity for IoT and IIoT environments |
title_alt | Smart and agile cybersecurity for internet of things and industrial internet of things environments |
title_auth | Smart and agile cybersecurity for IoT and IIoT environments |
title_exact_search | Smart and agile cybersecurity for IoT and IIoT environments |
title_full | Smart and agile cybersecurity for IoT and IIoT environments Qasem Abu Al-Haija, editor |
title_fullStr | Smart and agile cybersecurity for IoT and IIoT environments Qasem Abu Al-Haija, editor |
title_full_unstemmed | Smart and agile cybersecurity for IoT and IIoT environments Qasem Abu Al-Haija, editor |
title_short | Smart and agile cybersecurity for IoT and IIoT environments |
title_sort | smart and agile cybersecurity for iot and iiot environments |
topic | Computer networks Security measures Computer security Data protection Internet of things |
topic_facet | Computer networks Security measures Computer security Data protection Internet of things |
url | https://doi.org/10.4018/979-8-3693-3451-5 |
work_keys_str_mv | AT alhaijaqasemabu smartandagilecybersecurityforiotandiiotenvironments AT alhaijaqasemabu smartandagilecybersecurityforinternetofthingsandindustrialinternetofthingsenvironments |