Applied approach to privacy and security for the Internet of things:
"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"-- |
Beschreibung: | 22 PDFs (295 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799824466 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00236588 | ||
003 | IGIG | ||
005 | 20200703113428.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200704s2020 pau fob 001 0 eng d | ||
010 | |z 2019039274 | ||
020 | |a 9781799824466 |q ebook | ||
020 | |z 1799824462 | ||
020 | |z 9781799824442 |q hardcover | ||
020 | |z 9781799824459 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-2444-2 |2 doi | |
035 | |a (CaBNVSL)slc00000590 | ||
035 | |a (OCoLC)1162955377 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.8857 |b .A67 2020e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Applied approach to privacy and security for the Internet of things |c edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 22 PDFs (295 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 07/04/2020). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Embedded Internet devices |x Security measures. | |
650 | 0 | |a Internet of things |x Security measures. | |
650 | 7 | |a Computer networks |x Security measures. |2 fast | |
700 | 1 | |a Benoist, Emmanuel |d 1972- |e editor. | |
700 | 1 | |a Chatterjee, Parag |d 1992- |e editor. | |
700 | 1 | |a Nath, Asoke |d 1953- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019039274 | |
776 | 0 | 8 | |i Print version: |z 1799824446 |z 9781799824442 |w (DLC) 2019039274 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00236588 |
---|---|
_version_ | 1816797083180466176 |
adam_text | |
any_adam_object | |
author2 | Benoist, Emmanuel 1972- Chatterjee, Parag 1992- Nath, Asoke 1953- |
author2_role | edt edt edt |
author2_variant | e b eb p c pc a n an |
author_facet | Benoist, Emmanuel 1972- Chatterjee, Parag 1992- Nath, Asoke 1953- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8857 .A67 2020e |
callnumber-search | TK5105.8857 .A67 2020e |
callnumber-sort | TK 45105.8857 A67 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system. |
ctrlnum | (CaBNVSL)slc00000590 (OCoLC)1162955377 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03223nam a2200517 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00236588</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200703113428.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200704s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019039274</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799824466</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799824462</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799824442</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799824459</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-2444-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000590</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1162955377</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8857</subfield><subfield code="b">.A67 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applied approach to privacy and security for the Internet of things </subfield><subfield code="c">edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (295 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 07/04/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Embedded Internet devices</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Benoist, Emmanuel</subfield><subfield code="d">1972-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chatterjee, Parag</subfield><subfield code="d">1992-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nath, Asoke</subfield><subfield code="d">1953-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019039274</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799824446</subfield><subfield code="z">9781799824442</subfield><subfield code="w">(DLC) 2019039274</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00236588 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:56Z |
institution | BVB |
isbn | 9781799824466 |
language | English |
oclc_num | 1162955377 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 22 PDFs (295 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
spelling | Applied approach to privacy and security for the Internet of things edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 22 PDFs (295 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system. Restricted to subscribers or individual electronic text purchasers. "This book examines the conceptual aspects of security and privacy in IoT. It also explores the application of IoT systems in smart transports, smart cities, and smart healthcare"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 07/04/2020). Computer networks Security measures. Embedded Internet devices Security measures. Internet of things Security measures. Computer networks Security measures. fast Benoist, Emmanuel 1972- editor. Chatterjee, Parag 1992- editor. Nath, Asoke 1953- editor. IGI Global, publisher. (Original) (DLC)2019039274 Print version: 1799824446 9781799824442 (DLC) 2019039274 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2 Volltext |
spellingShingle | Applied approach to privacy and security for the Internet of things Chapter 1. IoT forensic science: principles, processes, and activities -- Chapter 2. Key vulnerabilities in Internet of things: a holistic view -- Chapter 3. Real-time, cross-platform detection of spectre and meltdown attack variants -- Chapter 4. Anomaly detection in IoT frameworks using machine learning -- Chapter 5. Collision avoidance methodology in Internet of things and wireless ad hoc network -- Chapter 6. How to authenticate MQTT sessions without channel and broker security -- Chapter 7. Patient empowerment in IoT for ehealth: how to deal with lost keys -- Chapter 8. Security and privacy vulnerabilities in automated driving -- Chapter 9. Using freenet as a broker for multi-party data exchange in IoT for health -- Chapter 10. Information security management system: a case study of employee management -- Chapter 11. Vulnerabilities of smart homes -- Chapter 12. IoT-controlled railway gate system with ML object detection approach: applied approach for a secured IoT system. Computer networks Security measures. Embedded Internet devices Security measures. Internet of things Security measures. Computer networks Security measures. fast |
title | Applied approach to privacy and security for the Internet of things |
title_auth | Applied approach to privacy and security for the Internet of things |
title_exact_search | Applied approach to privacy and security for the Internet of things |
title_full | Applied approach to privacy and security for the Internet of things edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. |
title_fullStr | Applied approach to privacy and security for the Internet of things edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. |
title_full_unstemmed | Applied approach to privacy and security for the Internet of things edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath. |
title_short | Applied approach to privacy and security for the Internet of things |
title_sort | applied approach to privacy and security for the internet of things |
topic | Computer networks Security measures. Embedded Internet devices Security measures. Internet of things Security measures. Computer networks Security measures. fast |
topic_facet | Computer networks Security measures. Embedded Internet devices Security measures. Internet of things Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2444-2 |
work_keys_str_mv | AT benoistemmanuel appliedapproachtoprivacyandsecurityfortheinternetofthings AT chatterjeeparag appliedapproachtoprivacyandsecurityfortheinternetofthings AT nathasoke appliedapproachtoprivacyandsecurityfortheinternetofthings AT igiglobal appliedapproachtoprivacyandsecurityfortheinternetofthings |