• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Ubiquitous computing and computing security of IoT /

پدید آورنده
N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.

موضوع
Internet of things-- Security measures.,Ubiquitous computing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Ubiquitous computing.

رده
TK5105
.
8857
.
U25
2019

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030015661
(Number (ISBN
303001567X
(Number (ISBN
3030131866
(Number (ISBN
9783030015664
(Number (ISBN
9783030015671
(Number (ISBN
9783030131869
Erroneous ISBN
3030015653
Erroneous ISBN
9783030015657

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Ubiquitous computing and computing security of IoT /
General Material Designation
[Book]
First Statement of Responsibility
N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
[2019]

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

SERIES

Series Title
Studies in big data ;
Volume Designation
volume 47

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references.

SUMMARY OR ABSTRACT

Text of Note
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030015664

OTHER EDITION IN ANOTHER MEDIUM

Title
Ubiquitous Computing and Computing Security of IoT.
International Standard Book Number
9783030015657

TOPICAL NAME USED AS SUBJECT

Internet of things-- Security measures.
Ubiquitous computing.
COMPUTERS-- Computer Literacy.
COMPUTERS-- Computer Science.
COMPUTERS-- Data Processing.
COMPUTERS-- Hardware-- General.
COMPUTERS-- Information Technology.
COMPUTERS-- Machine Theory.
COMPUTERS-- Reference.
Ubiquitous computing.

(SUBJECT CATEGORY (Provisional

COM-- 013000
COM-- 014000
COM-- 018000
COM-- 032000
COM-- 037000
COM-- 052000
COM-- 067000
UYQ
UYQ

DEWEY DECIMAL CLASSIFICATION

Number
004
.
67/8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
8857
Book number
.
U25
2019

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Abraham, Ajith,1968-
Jeyanthi, N.
Mcheick, Hamid

ORIGINATING SOURCE

Date of Transaction
20200823073158.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival