000 04329cam a2200589 i 4500
001 ocn968705987
003 OCoLC
005 20250612155440.0
006 m o d
007 cr cnu|||unuuu
008 170116t20172017maua ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dIDEBK
_dEBLCP
_dN$T
_dYDX
_dOCLCF
_dCOO
_dUMI
_dMERUC
_dUIU
_dWAU
_dTEFOD
_dSTF
_dMERER
_dOCLCQ
_dVT2
_dOTZ
_dOCLCQ
_dUPM
_dOCLCA
_dREB
_dMCW
_dD6H
_dEZC
_dU3W
_dCEF
_dKSU
_dEZ9
_dRRP
_dOCLCQ
_dDEBBG
_dOCLCQ
_dWYU
_dAU@
_dUKMGB
_dOCLCQ
_dS2H
_dOCLCO
_dOCLCQ
_dSFB
_dINARC
_dOCLCQ
_dOCLCO
_dOCLCL
_dSXB
_dOCLCQ
_dOCLCO
_dOCLCQ
015 _aGBB708177
_2bnb
016 7 _a018181525
_2Uk
019 _a968905189
_a971244944
_a993528166
_a1017877878
_a1066460515
_a1103258782
_a1129348621
_a1153047127
_a1235842910
_a1240533284
_a1262681324
_a1392120072
020 _a9780128045053
_q(electronic bk.)
020 _a0128045051
_q(electronic bk.)
020 _a0128044586
020 _a9780128044582
020 _z9780128044582
_q(paperback)
020 _z0128044586
_q(paperback)
024 3 _a9780128044582
035 _a(OCoLC)968705987
_z(OCoLC)968905189
_z(OCoLC)971244944
_z(OCoLC)993528166
_z(OCoLC)1017877878
_z(OCoLC)1066460515
_z(OCoLC)1103258782
_z(OCoLC)1129348621
_z(OCoLC)1153047127
_z(OCoLC)1235842910
_z(OCoLC)1240533284
_z(OCoLC)1262681324
_z(OCoLC)1392120072
050 4 _aTK5105.8857
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
082 0 4 _a004.67/8
_223
100 1 _aLi, Shancang,
_eauthor.
_933897
245 1 0 _aSecuring the internet of things /
_cShancang Li, Li Da Xu ; Imed Romdhani, contributor.
264 1 _aCambridge, MA :
_bSyngress, an imprint of Elsevier,
_c[2017]
264 4 _c�2017
300 _a1 online resource (144 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _a1. Introduction: securing the Internet of Things -- 2. Security architecture in the Internet of Things -- 3. Security and vulnerability in the Internet of Things -- 4. IoT node authentication -- 5. Security requirements in IoT architecture -- 6. Security in enabling technologies -- 7. Existing security scheme for IoT -- 8. Security concerns in social IoT -- 9. Confidentiality and security for IoT based healthcare.
520 _a"Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher
588 0 _aPrint version record.
650 0 _aInternet of things.
650 0 _aComputer networks
_xSecurity measures.
_911925
650 0 _aComputer security.
700 1 _aXu, Li D.,
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PCjFdXDvMGyGQyPHMgF73FC
_933898
700 1 _aRomdhani, Imed,
_econtributor.
_933899
776 0 8 _iPrint version:
_aLi, Shancang.
_tSecuring the internet of things.
_dCambridge, MA : Syngress, an imprint of Elsevier, [2017]
_z9780128044582
_w(OCoLC)972324781
856 4 0 _3ScienceDirect
_uhttps://www.sciencedirect.com/science/book/9780128044582
999 _c216377
_d216377