nav atļauts
nav atļauts
Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).
Nepieciešamā programmatūra
Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)
Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)
Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.
Chapter
1. Introduction to Internet of Things Security.
Chapter
2. IoT Hardware, Platform and Security Protocols.
Chapter
3. Secure Device Management and Device Attestation in IoT.
Chapter
4. Secure Operating Systems and Software.
Chapter
5. Wireless Physical Layer Security.
Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter
7. Secure data collection, aggregation, and sharing in the Internet of Things.
Chapter
8. Authentication, Authorization and Anonymization techniques in the IoT.
Chapter
9. Secure Identity, Access, and Mobility Management in the Internet of Things.
Chapter
10. Privacy-preserving scheme for Internet of Things.
Chapter
11. Trust Establishment Models in IoT.
Chapter
12. Secure communication protocols for the IoT.
Chapter
13. Adaptive Security in the Internet of Things.
Chapter
14. Covert Communication security methods.
Chapter
15. Clean-slate and cross-layer IoT security Design.
Chapter
16. Edge computing technology for secure IoT.
Chapter
17. Cloud Security for the IoT.
Chapter
18. IoT Security using Blockchain.
Chapter
19. IoT ecosystem-level security auditing, analysis, and Recovery.
Chapter
20. Risk Assessment and Vulnerability Analysis in the IoT.
Chapter
21. Threat Models and Attack Strategies in the Internet of Things.
Chapter
22. Security and Privacy Issues in IoT.
Chapter
23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques.
Chapter
24. Intrusion & malware detection and prevention techniques in IoT.
Chapter
25. 5G and 6G security issues and countermeasures.