Atjaunināt sīkdatņu piekrišanu

E-grāmata: Introduction to Cybersecurity in the Internet of Things

, , (Pace University, New York City, New York, USA)
  • Formāts: 644 pages
  • Izdošanas datums: 14-Mar-2024
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781003849612
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 175,32 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām
  • Formāts: 644 pages
  • Izdošanas datums: 14-Mar-2024
  • Izdevniecība: CRC Press
  • Valoda: eng
  • ISBN-13: 9781003849612
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. The authors discuss the overall IoT architecture, covering networking, computing, security threats and risks to hardware such as sensors, actuators, portable devices, etc., and infrastructure layers. They cover a range of technical concepts such as cryptography, distributed storage and data transmission, and offer practical advice on implementing security solutions such as authentication and access control. By exploring the future of cybersecurity in the IoT industry, with insights into the importance of big data and the threats posed by data mining techniques, this book is an essential resource for anyone interested in or working in the rapidly evolving field of IoT security"--

This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.



This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.

The authors discuss the overall IoT architecture, covering networking, computing, security threats and risks to hardware such as sensors, actuators, portable devices, etc., and infrastructure layers. They cover a range of technical concepts such as cryptography, distributed storage and data transmission, and offer practical advice on implementing security solutions such as authentication and access control.

By exploring the future of cybersecurity in the IoT industry, with insights into the importance of big data and the threats posed by data mining techniques, this book is an essential resource for anyone interested in or working in the rapidly evolving field of IoT security.

1. Introduction to Cybersecurity
2. Basic Concepts of Cybersecurity in Internet of Things
3. Privacy Issues Categorizations in Internet of Things
4. Security in Cloud Computing and Cyber Physical Systems
5. Threat Models and Network Security
6. Cryptography and Cryptosystems
7. Wireless Network Security
8. Infrastructure and Hardware Security
9. Secure Distributed Data Storage and Processing
10. Digital Twin Optimization in Internet of Things

Keke Gai is a professor at the School of Cyberspace Science and Technology, Beijing Institute of Technology, China. With over a decade of experience serving on editorial boards, publishing books, and writing peer-reviewed journal and conference papers, he has developed a passion for various research areas, including cybersecurity, blockchain, the Internet of Things (IoT), privacy-preserving computation, centralized identity, and cloud computing.

Jing Yu is an associate professor with the Institute of Information Engineering, Chinese Academy of Sciences. She is an expert in cutting-edge fields of cybersecurity, including AI security, visual question answering, visual dialogue, and cross-modal information retrieval.

Liehuang Zhu is a full professor with the School of Cyberspace Science and Technology, Beijing Institute of Technology. He is an academic explorer in a few frontier areas, such as blockchain, space network, and advanced cryptographic applications.