Cyber-assurance for the internet of things / (Record no. 74478)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05652nam a2200709 i 4500 |
001 - CONTROL NUMBER | |
control field | 7753052 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220712205939.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170210s2016 nju ob 001 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119193784 |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | electronic bk. |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 004.67/8 |
245 00 - TITLE STATEMENT | |
Title | Cyber-assurance for the internet of things / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 PDF (520 pages). |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Embedded Design Security. Certified Security by Design for the Internet of Things / Shiu-Kai Chin -- Cyber-Assurance Through Embedded Security for the Internet of Things / Tyson T Brooks, Joon Park -- A Secure Update Mechanism for Internet of Things Devices / Martin Goldberg -- Trust Impact. Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective / M Bala Krishna -- The Impact of IoT Devices on Network Trust Boundaries / Nicole Newmeyer -- Wearable Automation Provenance. Wearable IoT Computing: Interface, Emotions, Wearer'S Culture, and Security/Privacy Concerns / Robert Mccloud, Martha Lerski, Joon Park, Tyson T Brooks -- On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems / Martin Murillo -- Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety / Mark Underwood -- Cloud Artificial Intelligence Cyber-Physical Systems. A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture / Tyson T Brooks, Lee McKnight -- An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things / Utku Kose -- Perceived Threat Modeling for Cyber-Physical Systems / Christopher Leberknight. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. . Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications. Aids readers in understanding how to design and build cyber-assurance into the IoT. Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance. Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
Subject | Internet of things |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Brooks, Tyson T. |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7753052 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Hoboken, New Jersey : |
-- | Wiley : |
-- | IEEE Press, |
-- | [2017] |
264 #2 - | |
-- | [Piscataqay, New Jersey] : |
-- | IEEE Xplore, |
-- | [2016] |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | electronic |
-- | isbdmedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
588 ## - | |
-- | Online resource; title from PDF title page (John Wiley, viewed December 29, 2016). |
695 ## - | |
-- | Actuators |
695 ## - | |
-- | Automation |
695 ## - | |
-- | Computer architecture |
695 ## - | |
-- | Cyber-physical systems |
695 ## - | |
-- | Floods |
695 ## - | |
-- | Hydroelectric power generation |
695 ## - | |
-- | Information technology |
695 ## - | |
-- | Internet |
695 ## - | |
-- | Intrusion detection |
695 ## - | |
-- | Marine animals |
695 ## - | |
-- | Process control |
695 ## - | |
-- | Protocols |
695 ## - | |
-- | Reservoirs |
695 ## - | |
-- | Rivers |
695 ## - | |
-- | Software systems |
No items available.