Gespeichert in:
Bibliographische Detailangaben
Beteiligte Personen: Kumar, Neeraj (VerfasserIn), Miglani, Arzoo (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Boca Raton ; London ; New York CRC Press, Taylor & Francis Group 2021
Ausgabe:First edition
Schlagwörter:
Links:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2727631
Abstract:Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Biography -- I: Background -- 1. Overview of Internet of Things -- 1.1. Understanding the Concept of Internet of Things -- 1.1.1. Components of IoT -- 1.2. Big Data Revolution -- 1.2.1. Big data and IoT -- 1.3. Understanding edge computing -- 2. Smart Applications -- 2.1. Internet-of-Energy -- 2.2. Autonomous Vehicles -- 2.3. Healthcare -- 2.4. Smart Farming -- 2.5. Smart Education -- 2.6. Smart Industry -- 2.7. Smart City -- 3. IoT challenges -- 3.1. Security -- 3.2. Data Management -- 3.3. Privacy -- 3.4. Heterogeneity -- 3.5. Latency -- 3.6. Communication Challenge in IoT -- II: Blockchain Overview -- 4. Python Basics -- 4.1. Introduction -- 4.2. Comments -- 4.3. Multi-line Statement -- 4.4. Blocks and Indentation -- 4.5. Creating Variables and Assigning Values -- 4.6. Data Types -- 4.7. Operators -- 4.7.1. Arithmetic operator -- 4.7.2. Comparison operator -- 4.7.3. Logical operator -- 4.7.4. Python Bitwise operator -- 4.7.5. Assignment operator -- 4.7.6. Membership operator -- 4.7.7. Identity Operators -- 4.8. Input and Output in Python -- 4.9. List -- 4.10. Dictionary -- 4.11. Python Conditions and if-else -- 4.12. Loops -- 4.13. Functions in Python -- 4.14. Classes and Objects in Python -- 4.15. File Handling in Python -- 4.15.1. open() function -- 4.15.2. close() function -- 4.15.3. read() function -- 4.16. write() function -- 5. Cryptography Primitives -- 5.1. Introduction -- 5.2. Encryption/Decryption Process -- 5.2.1. Encryption -- 5.2.2. Decryption -- 5.2.3. Symmetric key encryption -- 5.2.4. Asymmetric key encryption -- 5.2.5. Public key -- 5.2.6. Private key -- 5.3. Cryptographic Hash Functions -- 5.3.1. Typical properties of a hash function -- 5.3.2. Requirements of hash function: -- 5.3.3. Applications of cryptographic hash functions
Beschreibung:Description based on publisher supplied metadata and other sources
Umfang:1 Online-Ressource
ISBN:9781000327694
9781000327632
9781003080046