Doprava zdarma se Zásilkovnou nad 1 299 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 GLS 54 Kurýr GLS 64 Zásilkovna 44 PPL 99

Security Challenges and Approaches in Internet of Things

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Security Challenges and Approaches in Internet of Things Sridipta Misra
Libristo kód: 13513442
Nakladatelství Springer International Publishing AG, září 2016
This book provides a comprehensive survey of the security§and privacy research advancements in Inter... Celý popis
? points 160 b
1 603
Skladem u dodavatele v malém množství Odesíláme za 10-14 dnů

30 dní na vrácení zboží


Mohlo by vás také zajímat


TOP
How To Do The Work Nicole LePera / Brožovaná
common.buy 445
Watership Down Richard Adams / Brožovaná
common.buy 269
Far And Wide Neil Peart / Brožovaná
common.buy 549
Pediatric Critical Care Medicine Derek S. Wheeler / Brožovaná
common.buy 3 423
Lord Clive and the Establishment of the English in India George Bruce Malleson / Brožovaná
common.buy 527
Art of Asking Amanda Palmer / Pevná
common.buy 815
Liebe im Feld / Brožovaná
common.buy 1 127
Tecnologías de apoyo en logopedia Julio Ruiz Palmero / Brožovaná
common.buy 413

This book provides a comprehensive survey of the security§and privacy research advancements in Internet of Things (IoT). The book lays the§context for the discussion by introducing a system model for IoT. Since IoT is§very varied and has been introduced in many different contexts, the system§model introduced plays a crucial role in integrating the concepts§into a coherent framework. After the system model, the book introduces the§vulnerable features of the IoT. By providing a comprehensive discussion of the§vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features§as a motivation, the book presents a vast survey of existing security and§privacy approaches for IoT. The survey is a good way for the reader to pick up§interesting directions of research that have already been explored and also§hints at directions that could take additional investigation. Finally, the book§presents four case studies that provide a detailed view of how some of the§security and privacy concerns are addressed in specific problem areas.§

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet