Security and privacy in Internet of Things (IoTs) : (Record no. 53668)

MARC details
000 -LEADER
fixed length control field 03775nam a2200541 i 4500
001 - CONTROL NUMBER
control field 704792
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230224152317.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160115t20162016flua fsb 001|0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781498723190 (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781498723183 (hbk.) :
035 ## - SYSTEM CONTROL NUMBER
System control number (StDuBDS)AH29282213
040 ## - CATALOGING SOURCE
Original cataloging agency StDuBDS
Language of cataloging eng
Transcribing agency StDuBDS
Modifying agency StDuBDSZ
Description conventions rda
Modifying agency UkPrAHLS
-- UkLoUWL
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Source ukslc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TBM
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJKW
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code TBM
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJKW
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJFD
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJKT1
Source thema
245 00 - TITLE STATEMENT
Title Security and privacy in Internet of Things (IoTs) :
Remainder of title models, algorithms, and implementations /
Statement of responsibility, etc. edited by Fei Hu.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice [2016]
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ℗♭2016
300 ## - PHYSICAL DESCRIPTION
Extent xx, 584 pages :
Other physical details illustrations (black and white)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
366 ## - TRADE AVAILABILITY INFORMATION
Detailed date of publication 20160407
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 8# - SUMMARY, ETC.
Summary, etc. The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in printed form ISBN 9781498723183
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Agency responsible for reproduction Askews and Holts.
Note about reproduction Mode of access: World Wide Web.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and IT.
Source of heading or term ukslc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Instruments & instrumentation engineering
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element WAP (wireless) technology
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic devices & materials
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile phone technology
Source of heading or term thema
655 #7 - INDEX TERM--GENRE/FORM
Source of term lcsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hu, Fei
Titles and other words associated with a name (Software engineer),
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9781498723190">http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9781498723190</a>
Public note Click here, 1 copy
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC Do not suppress from OPAC
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
    Other/Generic Classification Scheme     Electronic publication Electronic publication 11/12/2018   23/04/2021 19/07/2021 E-book
    Other/Generic Classification Scheme     Electronic publication Electronic publication 11/12/2018   23/04/2021 19/07/2021 E-book