Ubiquitous computing and computing security of IoT /
General Material Designation
[Book]
First Statement of Responsibility
N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
[2019]
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource
SERIES
Series Title
Studies in big data ;
Volume Designation
volume 47
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references.
SUMMARY OR ABSTRACT
Text of Note
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030015664
OTHER EDITION IN ANOTHER MEDIUM
Title
Ubiquitous Computing and Computing Security of IoT.