Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Internet of Things Security and Data Protection, S?bastien Ziegler


Варианты приобретения
Цена: 158380.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 133 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: S?bastien Ziegler
Название:  Internet of Things Security and Data Protection
ISBN: 9783030049836
Издательство: Springer
Классификация:





ISBN-10: 3030049833
Обложка/Формат: Hardcover
Страницы: 221
Вес: 0.52 кг.
Дата издания: 2019
Серия: Internet of Things
Язык: English
Издание: 1st ed. 2019
Иллюстрации: 35 illustrations, color; 2 illustrations, black and white; xi, 221 p. 37 illus., 35 illus. in color.
Размер: 230 x 211 x 2
Читательская аудитория: Professional & vocational
Основная тема: Engineering
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT.

Towards the Internet of Things: Architectures, Security, and Applications

Автор: Jabraeil Jamali Mohammad Ali, Bahrami Bahareh, Heidari Arash
Название: Towards the Internet of Things: Architectures, Security, and Applications
ISBN: 3030184676 ISBN-13(EAN): 9783030184674
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming.

Discusses ongoing research into the connection of the physical and virtual worlds;Includes the architecture, security, privacy, communications, and protocols of IoT;Presents a variety of case studies in IoT including wearables, smart cities, and energy management.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681734583 ISBN-13(EAN): 9781681734583
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 76690.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Privacy in Mobile and Pervasive Computing

Автор: Marc Langheinrich, Florian Schaub
Название: Privacy in Mobile and Pervasive Computing
ISBN: 1681731177 ISBN-13(EAN): 9781681731179
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 56370.00 T
Наличие на складе: Невозможна поставка.
Описание: It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes ""privacy"" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

Security Challenges and Approaches in Internet of Things

Автор: Misra
Название: Security Challenges and Approaches in Internet of Things
ISBN: 3319442295 ISBN-13(EAN): 9783319442297
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Social Tagging for Linking Data Across Environments

Автор: Pennington Diane
Название: Social Tagging for Linking Data Across Environments
ISBN: 1783303387 ISBN-13(EAN): 9781783303380
Издательство: Facet
Рейтинг:
Цена: 109120.00 T
Наличие на складе: Нет в наличии.
Описание: This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.

Social Tagging in a Linked Data Environment

Автор: Diane Rasmussen Pennington, Louise Spiteri
Название: Social Tagging in a Linked Data Environment
ISBN: 1783303395 ISBN-13(EAN): 9781783303397
Издательство: Facet
Рейтинг:
Цена: 218240.00 T
Наличие на складе: Невозможна поставка.
Описание: This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.

Framing Privacy in Digital Collections with Ethical Decision Making

Автор: Virginia Dressler
Название: Framing Privacy in Digital Collections with Ethical Decision Making
ISBN: 1681734036 ISBN-13(EAN): 9781681734033
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 66530.00 T
Наличие на складе: Невозможна поставка.
Описание: As digital collections continue to grow, the underlying technologies to serve up content also continue to expand and develop. As such, new challenges are presented whichcontinue to test ethical ideologies in everyday environs of the practitioner. There are currently no solid guidelines or overarching codes of ethics to address such issues. The digitization of modern archival collections, in particular, presents interesting conundrums when factors of privacy are weighed and reviewed in both small and mass digitization initiatives. Ethical decision making needs to be present at the onset of project planning in digital projects of all sizes, and we also need to identify the role and responsibility of the practitioner to make more virtuous decisions on behalf of those with no voice or awareness of potential privacy breaches.In this book, notions of what constitutes private information are discussed, as is the potential presence of such information in both analog and digital collections. This book lays groundwork to introduce the topic of privacy within digital collections by providing some examples from documented real-world scenarios and making recommendations for future research.A discussion of the notion privacy as concept will be included, as well as some historical perspective (with perhaps one the most cited work on this topic, for example, Warren and Brandeis' ""Right to Privacy,"" 1890). Concepts from the The Right to Be Forgotten case in 2014 (Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González) are discussed as to how some lessons may be drawn from the response in Europe and also how European data privacy laws have been applied. The European ideologies are contrasted with the Right to Free Speech in the First Amendment in the U.S., highlighting the complexities in setting guidelines and practices revolving around privacy issues when applied to real life scenarios. Two ethical theories are explored: Consequentialism and Deontological. Finally, ethical decision making models will also be applied to our framework of digital collections. Three case studies are presented to illustrate how privacy can be defined within digital collections in some real-world examples.

Framing Privacy in Digital Collections with Ethical Decision Making

Автор: Virginia Dressler
Название: Framing Privacy in Digital Collections with Ethical Decision Making
ISBN: 168173401X ISBN-13(EAN): 9781681734019
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 46200.00 T
Наличие на складе: Невозможна поставка.
Описание: As digital collections continue to grow, the underlying technologies to serve up content also continue to expand and develop. As such, new challenges are presented whichcontinue to test ethical ideologies in everyday environs of the practitioner. There are currently no solid guidelines or overarching codes of ethics to address such issues. The digitization of modern archival collections, in particular, presents interesting conundrums when factors of privacy are weighed and reviewed in both small and mass digitization initiatives. Ethical decision making needs to be present at the onset of project planning in digital projects of all sizes, and we also need to identify the role and responsibility of the practitioner to make more virtuous decisions on behalf of those with no voice or awareness of potential privacy breaches.In this book, notions of what constitutes private information are discussed, as is the potential presence of such information in both analog and digital collections. This book lays groundwork to introduce the topic of privacy within digital collections by providing some examples from documented real-world scenarios and making recommendations for future research.A discussion of the notion privacy as concept will be included, as well as some historical perspective (with perhaps one the most cited work on this topic, for example, Warren and Brandeis' ""Right to Privacy,"" 1890). Concepts from the The Right to Be Forgotten case in 2014 (Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González) are discussed as to how some lessons may be drawn from the response in Europe and also how European data privacy laws have been applied. The European ideologies are contrasted with the Right to Free Speech in the First Amendment in the U.S., highlighting the complexities in setting guidelines and practices revolving around privacy issues when applied to real life scenarios. Two ethical theories are explored: Consequentialism and Deontological. Finally, ethical decision making models will also be applied to our framework of digital collections. Three case studies are presented to illustrate how privacy can be defined within digital collections in some real-world examples.

Trustworthy Policies for Distributed Repositories

Автор: Reagan W. Moore, Hao Xu, Mike Conway, Arcot Rajasekar, Jon Crabtree, Helen Tibbo
Название: Trustworthy Policies for Distributed Repositories
ISBN: 1627058850 ISBN-13(EAN): 9781627058858
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 56370.00 T
Наличие на складе: Невозможна поставка.
Описание: A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly. The assurance includes plans for the sustainability of the repository, the accession of digital records, the management of technology evolution, and the mitigation of the risk of data loss. A detailed assessment is provided by the ISO-16363:2012 standard, "Space data and information transfer systems--Audit and certification of trustworthy digital repositories." This book examines whether the ISO specification for trustworthiness can be enforced by computer actionable policies. An implementation of the policies is provided and the policies are sorted into categories for procedures to manage externally generated documents, specify repository parameters, specify preservation metadata attributes, specify audit mechanisms for all preservation actions, specify control of preservation operations, and control preservation properties as technology evolves. An application of the resulting procedures is made to enforce trustworthiness within National Science Foundation data management plans.

Beginner`s guide to internet of things security

Автор: Gupta, B. B. Tewari, Aakanksha
Название: Beginner`s guide to internet of things security
ISBN: 036743069X ISBN-13(EAN): 9780367430696
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Нет в наличии.
Описание: This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately and try to identity solutions. It also analyzes the integration and scalability issues with the cross-layer architecture of IoT in detail.

Security and Fault Tolerance in Internet of Things

Автор: Rajat Subhra Chakraborty; Jimson Mathew; Athanasio
Название: Security and Fault Tolerance in Internet of Things
ISBN: 3030028062 ISBN-13(EAN): 9783030028060
Издательство: Springer
Рейтинг:
Цена: 111790.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Internet of Things Security

Автор: Gupta, Brij B. , Quamara, Megha
Название: Internet of Things Security
ISBN: 0367373963 ISBN-13(EAN): 9780367373962
Издательство: Taylor&Francis
Рейтинг:
Цена: 60220.00 T
Наличие на складе: Невозможна поставка.
Описание: This book addresses the security issues in IoT devices with respect to different technological paradigms of IoT. This book helps readers understand the underlying concepts of IoT, various security challenges, and real-time application areas of the domain.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия