Security designs for the cloud, IoT, and social networking:
"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, inv...
Gespeichert in:
Weitere beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey Salem, Massachusetts
John Wiley & Sons, Inc.
[2019]
Hoboken, New Jersey Salem, Massachusetts Scrivener Publishing LLC [2019] |
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119592266/?ar |
Zusammenfassung: | "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- |
Beschreibung: | Includes bibliographical references and index. - Print version record and CIP data provided by publisher |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119593188 1119593182 9781119593201 1119593204 9781119593171 1119593174 9781119592266 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-058898107 | ||
003 | DE-627-1 | ||
005 | 20240228120854.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781119593188 |c epub |9 978-1-119-59318-8 | ||
020 | |a 1119593182 |9 1-119-59318-2 | ||
020 | |a 9781119593201 |c adobe pdf |9 978-1-119-59320-1 | ||
020 | |a 1119593204 |9 1-119-59320-4 | ||
020 | |a 9781119593171 |c electronic bk. |9 978-1-119-59317-1 | ||
020 | |a 1119593174 |c electronic bk. |9 1-119-59317-4 | ||
020 | |a 9781119592266 |9 978-1-119-59226-6 | ||
035 | |a (DE-627-1)058898107 | ||
035 | |a (DE-599)KEP058898107 | ||
035 | |a (ORHE)9781119592266 | ||
035 | |a (DE-627-1)058898107 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.67/82 |2 23 | |
245 | 1 | 0 | |a Security designs for the cloud, IoT, and social networking |c edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar |
250 | |a First edition. | ||
264 | 1 | |a Hoboken, New Jersey |a Salem, Massachusetts |b John Wiley & Sons, Inc. |c [2019] | |
264 | 1 | |a Hoboken, New Jersey |a Salem, Massachusetts |b Scrivener Publishing LLC |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record and CIP data provided by publisher | ||
520 | |a "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- | ||
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Internet of things |x Security measures | |
650 | 0 | |a Social media |x Security measures | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Internet des objets ; Sécurité ; Mesures | |
650 | 4 | |a Médias sociaux ; Sécurité ; Mesures | |
650 | 4 | |a Cloud computing ; Security measures | |
700 | 1 | |a Le, Dac-Nhuong |d 1983- |e HerausgeberIn |4 edt | |
700 | 1 | |a Bhatt, Chintan M. |d 1988- |e HerausgeberIn |4 edt | |
700 | 1 | |a Madhukar, Mani |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781119592266 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119592266 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119592266/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-058898107 |
---|---|
_version_ | 1821494836693303296 |
adam_text | |
any_adam_object | |
author2 | Le, Dac-Nhuong 1983- Bhatt, Chintan M. 1988- Madhukar, Mani |
author2_role | edt edt edt |
author2_variant | d n l dnl c m b cm cmb m m mm |
author_facet | Le, Dac-Nhuong 1983- Bhatt, Chintan M. 1988- Madhukar, Mani |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)058898107 (DE-599)KEP058898107 (ORHE)9781119592266 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02792cam a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-058898107</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120854.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119593188</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-119-59318-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119593182</subfield><subfield code="9">1-119-59318-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119593201</subfield><subfield code="c">adobe pdf</subfield><subfield code="9">978-1-119-59320-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119593204</subfield><subfield code="9">1-119-59320-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119593171</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-59317-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119593174</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-59317-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119592266</subfield><subfield code="9">978-1-119-59226-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058898107</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP058898107</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119592266</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058898107</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security designs for the cloud, IoT, and social networking</subfield><subfield code="c">edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="a">Salem, Massachusetts</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="a">Salem, Massachusetts</subfield><subfield code="b">Scrivener Publishing LLC</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record and CIP data provided by publisher</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social media</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Médias sociaux ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Le, Dac-Nhuong</subfield><subfield code="d">1983-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhatt, Chintan M.</subfield><subfield code="d">1988-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Madhukar, Mani</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119592266</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119592266</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119592266/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-058898107 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:43Z |
institution | BVB |
isbn | 9781119593188 1119593182 9781119593201 1119593204 9781119593171 1119593174 9781119592266 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | John Wiley & Sons, Inc. Scrivener Publishing LLC |
record_format | marc |
spelling | Security designs for the cloud, IoT, and social networking edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar First edition. Hoboken, New Jersey Salem, Massachusetts John Wiley & Sons, Inc. [2019] Hoboken, New Jersey Salem, Massachusetts Scrivener Publishing LLC [2019] 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record and CIP data provided by publisher "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"-- Cloud computing Security measures Internet of things Security measures Social media Security measures Infonuagique ; Sécurité ; Mesures Internet des objets ; Sécurité ; Mesures Médias sociaux ; Sécurité ; Mesures Cloud computing ; Security measures Le, Dac-Nhuong 1983- HerausgeberIn edt Bhatt, Chintan M. 1988- HerausgeberIn edt Madhukar, Mani HerausgeberIn edt 9781119592266 Erscheint auch als Druck-Ausgabe 9781119592266 |
spellingShingle | Security designs for the cloud, IoT, and social networking Cloud computing Security measures Internet of things Security measures Social media Security measures Infonuagique ; Sécurité ; Mesures Internet des objets ; Sécurité ; Mesures Médias sociaux ; Sécurité ; Mesures Cloud computing ; Security measures |
title | Security designs for the cloud, IoT, and social networking |
title_auth | Security designs for the cloud, IoT, and social networking |
title_exact_search | Security designs for the cloud, IoT, and social networking |
title_full | Security designs for the cloud, IoT, and social networking edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar |
title_fullStr | Security designs for the cloud, IoT, and social networking edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar |
title_full_unstemmed | Security designs for the cloud, IoT, and social networking edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar |
title_short | Security designs for the cloud, IoT, and social networking |
title_sort | security designs for the cloud iot and social networking |
topic | Cloud computing Security measures Internet of things Security measures Social media Security measures Infonuagique ; Sécurité ; Mesures Internet des objets ; Sécurité ; Mesures Médias sociaux ; Sécurité ; Mesures Cloud computing ; Security measures |
topic_facet | Cloud computing Security measures Internet of things Security measures Social media Security measures Infonuagique ; Sécurité ; Mesures Internet des objets ; Sécurité ; Mesures Médias sociaux ; Sécurité ; Mesures Cloud computing ; Security measures |
work_keys_str_mv | AT ledacnhuong securitydesignsforthecloudiotandsocialnetworking AT bhattchintanm securitydesignsforthecloudiotandsocialnetworking AT madhukarmani securitydesignsforthecloudiotandsocialnetworking |