|
|
|
|
LEADER |
03909pam a22004571i 4500 |
001 |
180-019877995 |
003 |
Uk |
005 |
20200901021025.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
200805s2020 flua ob 001|0|eng|d |
015 |
|
|
|a GBC0A9393
|2 bnb
|
020 |
|
|
|a 9781000172287 (ePub ebook) :
|c £44.99
|
020 |
|
|
|z 9780367514969 (hbk.) :
|c £115.00
|
020 |
|
|
|a 9781000172249 (PDF ebook) :
|c £44.99
|
020 |
|
|
|a 9781000172263 (Mobipocket ebook) :
|c £44.99
|
020 |
|
|
|a 9781003054115 (ebook) :
|c £44.99
|
024 |
7 |
|
|a 10.1201/9781003054115
|2 doi
|
037 |
|
|
|a 9781000172287
|b Ingram Content Group
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.83
|2 23
|
245 |
0 |
0 |
|a IoT security paradigms and applications
|b research and practices
|c edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath
|
250 |
|
|
|a 1st
|
264 |
|
1 |
|a Boca Raton
|b CRC Press
|c 2020
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white).
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
0 |
|
|a Computational intelligence in engineering problem solving
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>
|
650 |
|
0 |
|a Internet of things.
|
700 |
1 |
|
|a Sharma, Sudhir Kumar
|e editor.
|
700 |
1 |
|
|a Bhushan, Bharat
|c (Software specialist),
|e editor.
|
700 |
1 |
|
|a Debnath, N. C.
|q (Narayan C.),
|e editor.
|
776 |
0 |
8 |
|i Print version :
|z 9780367514969
|
859 |
|
|
|a ELD
|b ebook
|
980 |
|
|
|a 019877995
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756570185728000 |
access_facet |
Electronic Resources |
author2 |
Sharma, Sudhir Kumar, Bhushan, Bharat (Software specialist), Debnath, N. C. |
author2_fuller |
(Narayan C.), |
author2_role |
edt, edt, edt |
author2_variant |
s k s sk sks, b b bb, n c d nc ncd |
author_facet |
Sharma, Sudhir Kumar, Bhushan, Bharat (Software specialist), Debnath, N. C. |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
contents |
<P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I> |
dewey-full |
005.83 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.83 |
dewey-search |
005.83 |
dewey-sort |
15.83 |
dewey-tens |
000 - Computer science, knowledge & systems |
doi_str_mv |
10.1201/9781003054115 |
edition |
1st |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-019877995 |
illustrated |
Illustrated |
imprint |
Boca Raton, CRC Press, 2020 |
imprint_str_mv |
Boca Raton CRC Press 2020 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781000172287 (ePub ebook) :, 9781000172249 (PDF ebook) :, 9781000172263 (Mobipocket ebook) :, 9781003054115 (ebook) : |
isbn_isn_mv |
9780367514969 (hbk.) :, 9780367514969 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:15.69Z |
marc024a_ct_mv |
10.1201/9781003054115 |
match_str |
sharma2020iotsecurityparadigmsandapplicationsresearchandpractices |
mega_collection |
British National Bibliography |
physical |
1 online resource; illustrations (black and white) |
publishDate |
2020 |
publishDateSort |
2020 |
publishPlace |
Boca Raton |
publisher |
CRC Press |
record_format |
marcfinc |
record_id |
019877995 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series2 |
Computational intelligence in engineering problem solving |
source_id |
180 |
spelling |
IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath, 1st, Boca Raton CRC Press 2020, 1 online resource : illustrations (black and white)., text rdacontent, still image rdacontent, computer rdamedia, online resource rdacarrier, Computational intelligence in engineering problem solving, Includes bibliographical references and index., Description based on CIP data; resource not viewed., <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>, Internet of things., Sharma, Sudhir Kumar editor., Bhushan, Bharat (Software specialist), editor., Debnath, N. C. (Narayan C.), editor., Print version : 9780367514969, ELD ebook |
spellingShingle |
IoT security paradigms and applications: research and practices, <P>Chapter 1 The Convergence of IoT with Big Data and Cloud Computing</P><I><P>[K. Rajkumar, Nilotpal Pathak, and U. Hariharan]</P></I><P>Chapter 2 Cybersecurity Management within the Internet of Things</P><I><P>[Hubert Szczepaniuk and Edyta Karolina Szczepaniuk]</P></I><P>Chapter 3 ROSET: Routing on SENSEnuts Testbeds in IoT Network</P><I><P>[Rahul Johari, Reena Tripathi, Ishveen Kaur, Kalpana Gupta,</P><P>and Rakesh Kumar Singh]</P></I><P>Chapter 4 Machine Learning: Approach towards Security</P><I><P>[Vidushi and Manisha Agarwal]</P></I><P>Chapter 5 Privacy Preservation with Machine Learning</P><I><P>[P. Bhuvaneswari and Nagender Kumar Suryadevara]</P></I><P>Chapter 6 Machine Learning-Based Internet-of-Things Security Schemes</P><I><P>[Deepak Kumar Sharma, Shrid Pant, and Mehul Sharma]</P></I><P>Chapter 7 Intrusion Detection of SCADA System Using Machine</P><P>Learning Techniques: A Study</P><I><P>[Koyela Chakrabarti]</P></I><P>Chapter 8 Person Authentication Based on Biometric Traits Using</P><P>Machine Learning Techniques</P><I><P>[Gautam Kumar, Debbrota Paul Chowdhury, Sambit Bakshi,</P><P>and Pankaj Kumar Sa]</P></I><P>Chapter 9 Data Security and Privacy through Text Steganography</P><P>Approaches</P><I><P>[Suvamoy Changder, Ratnakirti Roy, and Narayan C. Debnath]</P></I><P>Chapter 10 IoT as a Means of Strengthening Individual Farmers’ Position</P><P>in Collaboration for Transformation to Sustainable Farming</P><I><P>[J.S. Gusc, S. Jarka, and I.J. de Zwarte]</P></I><P>Chapter 11 Security in IoT HealthCare</P><I><P>[Manorama Mohapatro and Itu Snigdh]</P></I><P>Chapter 12 Emerging Wireless Technologies Based on IoT in Healthcare</P><P>Systems in Poland</P><I><P>[E. Stawicka and A. Parlinska]</P></I><P>Chapter 13 Biometric Monitoring in Healthcare IoT Systems Using Deep</P><P>Learning</P><I><P>[Shefali Arora, Veenu, M.P.S Bhatia, and Gurjot Kaur]</P></I><P>Chapter 14 Predictive Analysis of Type 2 Diabetes Using Hybrid</P><P>ML Model and IoT</P><I><P>[Abhishek Sharma, Nikhil Sharma, Ila Kaushik, Santosh Kumar,</P><P>and Naghma Khatoon]</P></I><P>Chapter 15 Securing Honey Supply Chain through Blockchain: An</P><P>Implementation View</P><I><P>[Sachin Gupta and Bhoomi Gupta]</P></I>, Internet of things. |
title |
IoT security paradigms and applications: research and practices |
title_auth |
IoT security paradigms and applications research and practices |
title_full |
IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath |
title_fullStr |
IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath |
title_full_unstemmed |
IoT security paradigms and applications research and practices edited by Sudhir Kumar Sharma, Bharat Bhushan and Narayan C. Debnath |
title_short |
IoT security paradigms and applications |
title_sort |
iot security paradigms and applications research and practices |
title_sub |
research and practices |
topic |
Internet of things. |
topic_facet |
Internet of things. |