Security solutions for hyperconnectivity and the Internet of things:
"This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher.
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :
IGI Global,
[2017]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher. |
Beschreibung: | PDFs (346 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522507420 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00149283 | ||
003 | IGIG | ||
005 | 20160915133608.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 160914s2017 paua fob 001 0 eng d | ||
010 | |z 2016023423 | ||
020 | |a 9781522507420 |q electronic | ||
020 | |z 9781522507413 |q print | ||
024 | 7 | |a 10.4018/978-1-5225-0741-3 |2 doi | |
035 | |a (CaBNVSL)gtp00566375 | ||
035 | |a (OCoLC)958440647 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HV6773.15.C97 |b S43 2017e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Security solutions for hyperconnectivity and the Internet of things |c Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : |b IGI Global, |c [2017] | |
300 | |a PDFs (346 pages) : |b illustrations. | ||
336 | |a still image |2 rdacontent | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity / Maurice Dawson -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- Security solutions for intelligent and complex systems / Stuart Armstrong, Roman V. Yampolskiy -- Privacy and security / Mohamed Eltayeb -- Enhancing cyber security for financial industry through compliance and regulatory standards / Derek Mohammed, Marwan Omar, Van Nguyen -- Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET / Vimal Kumar, Rakesh Kumar -- Trust management in cloud computing / Vijay L. Hallappanavar, Mahantesh N. Birje -- Security and trust in cloud computing / Eric Kuada -- Security issues in distributed computing system models / Ghada Farouk Elkabbany, Mohamed Rasslan -- Tails Linux operating system: the amnesiac incognito system in times of high surveillance, its security flaws, limitations, and strengths in the fight for democracy / Jose Antonio Cardenas-Haro, Maurice Dawson -- Cyber threats in civil aviation / Calvin Nobles. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 09/14/2016). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Internet of things. | |
653 | |a Blackhole attacks | ||
653 | |a Certificate-less signature scheme | ||
653 | |a Civil aviation | ||
653 | |a Distributed computing system | ||
653 | |a Internet of everything | ||
653 | |a Regulatory standards | ||
653 | |a Secure computing | ||
653 | |a Trust management | ||
653 | |a Web of things | ||
700 | 1 | |a Dawson, Maurice |d 1982- |e editor. | |
700 | 1 | |a Eltayeb, Mohamed |d 1978- |e editor. | |
700 | 1 | |a Omar, Marwan |d 1982- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2016023423 | |
776 | 0 | 8 | |i Print version: |z 1522507418 |z 9781522507413 |w (DLC) 2016023423 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0741-3 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00149283 |
---|---|
_version_ | 1816797077448949761 |
adam_text | |
any_adam_object | |
author2 | Dawson, Maurice 1982- Eltayeb, Mohamed 1978- Omar, Marwan 1982- |
author2_role | edt edt edt |
author2_variant | m d md m e me m o mo |
author_facet | Dawson, Maurice 1982- Eltayeb, Mohamed 1978- Omar, Marwan 1982- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 S43 2017e |
callnumber-search | HV6773.15.C97 S43 2017e |
callnumber-sort | HV 46773.15 C97 S43 42017E |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-98-IGB |
contents | Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity / Maurice Dawson -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- Security solutions for intelligent and complex systems / Stuart Armstrong, Roman V. Yampolskiy -- Privacy and security / Mohamed Eltayeb -- Enhancing cyber security for financial industry through compliance and regulatory standards / Derek Mohammed, Marwan Omar, Van Nguyen -- Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET / Vimal Kumar, Rakesh Kumar -- Trust management in cloud computing / Vijay L. Hallappanavar, Mahantesh N. Birje -- Security and trust in cloud computing / Eric Kuada -- Security issues in distributed computing system models / Ghada Farouk Elkabbany, Mohamed Rasslan -- Tails Linux operating system: the amnesiac incognito system in times of high surveillance, its security flaws, limitations, and strengths in the fight for democracy / Jose Antonio Cardenas-Haro, Maurice Dawson -- Cyber threats in civil aviation / Calvin Nobles. |
ctrlnum | (CaBNVSL)gtp00566375 (OCoLC)958440647 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03654nam a2200625 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00149283</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20160915133608.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">160914s2017 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2016023423</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522507420</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522507413</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-0741-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00566375</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)958440647</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.15.C97</subfield><subfield code="b">S43 2017e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security solutions for hyperconnectivity and the Internet of things </subfield><subfield code="c">Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (346 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">still image</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity / Maurice Dawson -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- Security solutions for intelligent and complex systems / Stuart Armstrong, Roman V. Yampolskiy -- Privacy and security / Mohamed Eltayeb -- Enhancing cyber security for financial industry through compliance and regulatory standards / Derek Mohammed, Marwan Omar, Van Nguyen -- Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET / Vimal Kumar, Rakesh Kumar -- Trust management in cloud computing / Vijay L. Hallappanavar, Mahantesh N. Birje -- Security and trust in cloud computing / Eric Kuada -- Security issues in distributed computing system models / Ghada Farouk Elkabbany, Mohamed Rasslan -- Tails Linux operating system: the amnesiac incognito system in times of high surveillance, its security flaws, limitations, and strengths in the fight for democracy / Jose Antonio Cardenas-Haro, Maurice Dawson -- Cyber threats in civil aviation / Calvin Nobles.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 09/14/2016).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blackhole attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Certificate-less signature scheme</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Civil aviation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Distributed computing system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet of everything</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Regulatory standards</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secure computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Trust management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Web of things</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dawson, Maurice</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Eltayeb, Mohamed</subfield><subfield code="d">1978-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Omar, Marwan</subfield><subfield code="d">1982-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2016023423</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522507418</subfield><subfield code="z">9781522507413</subfield><subfield code="w">(DLC) 2016023423</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0741-3</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00149283 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:50Z |
institution | BVB |
isbn | 9781522507420 |
language | English |
oclc_num | 958440647 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (346 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, |
record_format | marc |
spelling | Security solutions for hyperconnectivity and the Internet of things Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017] PDFs (346 pages) : illustrations. still image rdacontent text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity / Maurice Dawson -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- Security solutions for intelligent and complex systems / Stuart Armstrong, Roman V. Yampolskiy -- Privacy and security / Mohamed Eltayeb -- Enhancing cyber security for financial industry through compliance and regulatory standards / Derek Mohammed, Marwan Omar, Van Nguyen -- Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET / Vimal Kumar, Rakesh Kumar -- Trust management in cloud computing / Vijay L. Hallappanavar, Mahantesh N. Birje -- Security and trust in cloud computing / Eric Kuada -- Security issues in distributed computing system models / Ghada Farouk Elkabbany, Mohamed Rasslan -- Tails Linux operating system: the amnesiac incognito system in times of high surveillance, its security flaws, limitations, and strengths in the fight for democracy / Jose Antonio Cardenas-Haro, Maurice Dawson -- Cyber threats in civil aviation / Calvin Nobles. Restricted to subscribers or individual electronic text purchasers. "This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 09/14/2016). Computer crimes Prevention. Computer security. Cyberterrorism Prevention. Data protection. Internet of things. Blackhole attacks Certificate-less signature scheme Civil aviation Distributed computing system Internet of everything Regulatory standards Secure computing Trust management Web of things Dawson, Maurice 1982- editor. Eltayeb, Mohamed 1978- editor. Omar, Marwan 1982- editor. IGI Global, publisher. (Original) (DLC)2016023423 Print version: 1522507418 9781522507413 (DLC) 2016023423 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0741-3 Volltext |
spellingShingle | Security solutions for hyperconnectivity and the Internet of things Exploring secure computing for the internet of things, internet of everything, web of things, and hyperconnectivity / Maurice Dawson -- Internet of things research challenges / Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung -- Security solutions for intelligent and complex systems / Stuart Armstrong, Roman V. Yampolskiy -- Privacy and security / Mohamed Eltayeb -- Enhancing cyber security for financial industry through compliance and regulatory standards / Derek Mohammed, Marwan Omar, Van Nguyen -- Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET / Vimal Kumar, Rakesh Kumar -- Trust management in cloud computing / Vijay L. Hallappanavar, Mahantesh N. Birje -- Security and trust in cloud computing / Eric Kuada -- Security issues in distributed computing system models / Ghada Farouk Elkabbany, Mohamed Rasslan -- Tails Linux operating system: the amnesiac incognito system in times of high surveillance, its security flaws, limitations, and strengths in the fight for democracy / Jose Antonio Cardenas-Haro, Maurice Dawson -- Cyber threats in civil aviation / Calvin Nobles. Computer crimes Prevention. Computer security. Cyberterrorism Prevention. Data protection. Internet of things. |
title | Security solutions for hyperconnectivity and the Internet of things |
title_auth | Security solutions for hyperconnectivity and the Internet of things |
title_exact_search | Security solutions for hyperconnectivity and the Internet of things |
title_full | Security solutions for hyperconnectivity and the Internet of things Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors. |
title_fullStr | Security solutions for hyperconnectivity and the Internet of things Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors. |
title_full_unstemmed | Security solutions for hyperconnectivity and the Internet of things Maurice Dawson, Mohamed Eltayeb, and Marwan Omar, editors. |
title_short | Security solutions for hyperconnectivity and the Internet of things |
title_sort | security solutions for hyperconnectivity and the internet of things |
topic | Computer crimes Prevention. Computer security. Cyberterrorism Prevention. Data protection. Internet of things. |
topic_facet | Computer crimes Prevention. Computer security. Cyberterrorism Prevention. Data protection. Internet of things. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0741-3 |
work_keys_str_mv | AT dawsonmaurice securitysolutionsforhyperconnectivityandtheinternetofthings AT eltayebmohamed securitysolutionsforhyperconnectivityandtheinternetofthings AT omarmarwan securitysolutionsforhyperconnectivityandtheinternetofthings AT igiglobal securitysolutionsforhyperconnectivityandtheinternetofthings |