
Securing the Internet of Things
- Publisher's listprice EUR 45.95
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 949 Ft off)
- Discounted price 17 542 Ft (16 707 Ft + 5% VAT)
19 491 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Syngress
- Date of Publication 13 January 2017
- ISBN 9780128044582
- Binding Paperback
- No. of pages154 pages
- Size 234x190 mm
- Weight 390 g
- Language English 0
Categories
Long description:
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.
This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
MoreTable of Contents:
1. Introduction: Securing the Internet of Things
2. Security Architecture in the Internet of Things
3. Security and Vulnerability in the Internet of Things
4. IoT Node Authentication
5. Security Requirements in IoT Architecture
6. Security in Enabling Technologies
7. Existing Security Scheme for IoT
8. Security Concerns in Social IoT
9. Confidentiality and Security for IoT Based Healthcare