000 | 02729nam a2200385 i 4500 | ||
---|---|---|---|
999 |
_c45983 _d45983 |
||
003 | UDJG | ||
006 | a||||go|||| 001 0 | ||
007 | cr || aaaaaaaa | ||
008 | 200901t2017 gw |go|||| 001 0 eng d | ||
020 | _a9781501505775 | ||
040 |
_aUDJG _brum |
||
041 | _aeng | ||
100 | 1 |
_aGILCHRIST, Alasdair _939726 |
|
245 | 1 | 0 |
_aIoT Security Issues _h[online] / _cAlasdair Gilchrist |
260 |
_aBerlin : _bDe Gruyter, _c2017 |
||
300 |
_a1 resursă online _a(259 p.) |
||
505 |
_tFrontmatter _tAcknowledgements _tContents _tIntroduction _tPart I: Making sense of the hype _tChapter 1 – The consumer internet of things _tPart II: Security _tChapter 2 – It’s not just about the future _tChapter 3 – Flawed, insecure devices _tChapter 4 – Securing the unidentified _tChapter 5 – Consumer convenience Trumps security _tChapter 6 – Startups driving the IoT _tChapter 7 – Cyber-security and the customer experience _tChapter 8 – Security requirements for the IoT _tChapter 9 – Re-engineering the IoT _tChapter 10 – IoT production, security and strength _tChapter 11 – Wearable’s – A new developer’s headache _tChapter 12 – New surface threats _tPart III: Architecting the secure IoT _tChapter 13 – Designing the Secure IoT _tChapter 14 – Secure IoT architecture patterns _tChapter 15 – Threat models _tPart IV: Defending the IoT _tChapter 16 – Threats, vulnerabilities and risks _tChapter 17 – IoT security framework _tChapter 18 – Secure IoT design _tChapter 19 – Utilizing IPv6 security features _tPart V: Trust _tChapter 20 – The IoT of trust _tChapter 21 – It’s all about the data _tChapter 22 – Trusting the device _tChapter 23 – Who can we trust? _tPart VI: Privacy _tChapter 24 – Personal private information (PIP) _tChapter 25 – The U.S. and EU data privacy shield _tPart VII: Surveillance, subterfuge and sabotage _tChapter 26 – The panopticon _tIndex |
||
536 | _aAchiziție prin proiectul Anelis Plus 2020. | ||
648 | _2UDJG | ||
650 | 7 |
_2UDJG _aDE-Calculatoare și tehnologia informației _9551 |
|
651 | _2UDJG | ||
655 | _2UDJG | ||
690 | 7 |
_2UDJG _935248 _acărți electronice |
|
690 | 7 |
_2udjg _acărți achiziții _93407 |
|
690 | 7 |
_2udjg _acărți străine _9102 |
|
690 | 7 |
_2udjg _9717 _ainformatică |
|
690 | 7 |
_2udjg _98807 _asecuritatea sistemelor informatice |
|
690 | 7 |
_2udjg _95218 _abaze de date |
|
690 | 7 |
_2udjg _965 _atehnologia informației (IT) |
|
690 | 7 |
_2udjg _9962 _arețele de calculatoare |
|
856 | 4 | 1 |
_uhttps://www-degruyter-com.am.e-nformation.ro/view/title/526420?tab_body=overview _zAcces la textul integral numai din contul de acces mobil. |
942 |
_2udc _cEBK |