Securing the internet of things:
"Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is adva...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Cambridge, MA
Syngress, an imprint of Elsevier
[2017]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780128045053/?ar |
Summary: | "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (144 Seiten) illustrations |
ISBN: | 9780128045053 0128045051 0128044586 9780128044582 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047408170 | ||
003 | DE-627-1 | ||
005 | 20240228120222.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9780128045053 |c electronic bk. |9 978-0-12-804505-3 | ||
020 | |a 0128045051 |c electronic bk. |9 0-12-804505-1 | ||
020 | |a 0128044586 |9 0-12-804458-6 | ||
020 | |a 9780128044582 |9 978-0-12-804458-2 | ||
035 | |a (DE-627-1)047408170 | ||
035 | |a (DE-599)KEP047408170 | ||
035 | |a (ORHE)9780128045053 | ||
035 | |a (DE-627-1)047408170 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.67/8 |2 23 | |
100 | 1 | |a Li, Shancang |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing the internet of things |c Shancang Li, Li Da Xu ; Imed Romdhani, contributor |
264 | 1 | |a Cambridge, MA |b Syngress, an imprint of Elsevier |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 Online-Ressource (144 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher | ||
650 | 0 | |a Internet of things | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Internet des objets | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet of things | |
700 | 1 | |a Xu, Li D. |e VerfasserIn |4 aut | |
700 | 1 | |a Romdhani, Imed |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780128044582 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128044582 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128045053/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047408170 |
---|---|
_version_ | 1829007815710081024 |
adam_text | |
any_adam_object | |
author | Li, Shancang Xu, Li D. |
author2 | Romdhani, Imed |
author2_role | ctb |
author2_variant | i r ir |
author_facet | Li, Shancang Xu, Li D. Romdhani, Imed |
author_role | aut aut |
author_sort | Li, Shancang |
author_variant | s l sl l d x ld ldx |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047408170 (DE-599)KEP047408170 (ORHE)9780128045053 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03659cam a22007212c 4500</leader><controlfield tag="001">ZDB-30-ORH-047408170</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120222.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128045053</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-804505-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128045051</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-804505-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128044586</subfield><subfield code="9">0-12-804458-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128044582</subfield><subfield code="9">978-0-12-804458-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408170</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047408170</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128045053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408170</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Shancang</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the internet of things</subfield><subfield code="c">Shancang Li, Li Da Xu ; Imed Romdhani, contributor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress, an imprint of Elsevier</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (144 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Li D.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Romdhani, Imed</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128044582</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128044582</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128045053/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047408170 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:18Z |
institution | BVB |
isbn | 9780128045053 0128045051 0128044586 9780128044582 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (144 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress, an imprint of Elsevier |
record_format | marc |
spelling | Li, Shancang VerfasserIn aut Securing the internet of things Shancang Li, Li Da Xu ; Imed Romdhani, contributor Cambridge, MA Syngress, an imprint of Elsevier [2017] ©2017 1 Online-Ressource (144 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher Internet of things Computer networks Security measures Computer security Computer Security Internet des objets Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Security measures Xu, Li D. VerfasserIn aut Romdhani, Imed MitwirkendeR ctb 9780128044582 Erscheint auch als Druck-Ausgabe 9780128044582 |
spellingShingle | Li, Shancang Xu, Li D. Securing the internet of things Internet of things Computer networks Security measures Computer security Computer Security Internet des objets Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Security measures |
title | Securing the internet of things |
title_auth | Securing the internet of things |
title_exact_search | Securing the internet of things |
title_full | Securing the internet of things Shancang Li, Li Da Xu ; Imed Romdhani, contributor |
title_fullStr | Securing the internet of things Shancang Li, Li Da Xu ; Imed Romdhani, contributor |
title_full_unstemmed | Securing the internet of things Shancang Li, Li Da Xu ; Imed Romdhani, contributor |
title_short | Securing the internet of things |
title_sort | securing the internet of things |
topic | Internet of things Computer networks Security measures Computer security Computer Security Internet des objets Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Security measures |
topic_facet | Internet of things Computer networks Security measures Computer security Computer Security Internet des objets Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Computer networks ; Security measures |
work_keys_str_mv | AT lishancang securingtheinternetofthings AT xulid securingtheinternetofthings AT romdhaniimed securingtheinternetofthings |