|
|
|
|
LEADER |
01071nam a22003018i 4500 |
001 |
180-020431249 |
003 |
Uk |
005 |
20211221170104.0 |
008 |
211207s2022 nju b 001|0|eng|d |
007 |
tu |
015 |
|
|
|a GBC1L2041
|2 bnb
|
016 |
7 |
|
|a 020431249
|2 Uk
|
020 |
|
|
|a 9781119607748 (hbk.) :
|c £103.00
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|e rda
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Security and privacy in the Internet of Things
|b architectures, techniques, and applications
|c edited by Ali Ismail Awad, Jemal Abawajy
|
263 |
|
|
|a 202202
|
264 |
|
1 |
|a Hoboken
|b Wiley-IEEE Press
|c 2022
|
300 |
|
|
|a 1 volume
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a unmediated
|2 rdamedia
|
338 |
|
|
|a volume
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
700 |
1 |
|
|a Awad, Ali Ismail
|e editor.
|1 https://isni.org/isni/0000000418786101
|
700 |
1 |
|
|a Abawajy, Jemal H.
|d 1982-
|e editor.
|1 https://isni.org/isni/0000000359959876
|
980 |
|
|
|a 020431249
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1767585877454749696 |
access_facet |
Local Holdings |
author2 |
Awad, Ali Ismail, Abawajy, Jemal H. |
author2_role |
edt, edt |
author2_variant |
a i a ai aia, j h a jh jha |
author_facet |
Awad, Ali Ismail, Abawajy, Jemal H. |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Local |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-020431249 |
illustrated |
Not Illustrated |
imprint |
Hoboken, Wiley-IEEE Press, 2022 |
imprint_str_mv |
Hoboken Wiley-IEEE Press 2022 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781119607748 (hbk.) : |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-06-02T10:20:53.154Z |
match_str |
awad2022securityandprivacyintheinternetofthingsarchitecturestechniquesandapplications |
mega_collection |
British National Bibliography |
physical |
1 volume |
publishDate |
2022 |
publishDateSort |
2022 |
publishPlace |
Hoboken |
publisher |
Wiley-IEEE Press |
record_format |
marcfinc |
record_id |
020431249 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
score |
17,280825 |
source_id |
180 |
spelling |
Security and privacy in the Internet of Things architectures, techniques, and applications edited by Ali Ismail Awad, Jemal Abawajy, 202202, Hoboken Wiley-IEEE Press 2022, 1 volume, text rdacontent, unmediated rdamedia, volume rdacarrier, Includes bibliographical references and index., Internet of things Security measures., Data protection., Awad, Ali Ismail editor. https://isni.org/isni/0000000418786101, Abawajy, Jemal H. 1982- editor. https://isni.org/isni/0000000359959876 |
spellingShingle |
Security and privacy in the Internet of Things: architectures, techniques, and applications, Internet of things Security measures., Data protection. |
title |
Security and privacy in the Internet of Things: architectures, techniques, and applications |
title_auth |
Security and privacy in the Internet of Things architectures, techniques, and applications |
title_full |
Security and privacy in the Internet of Things architectures, techniques, and applications edited by Ali Ismail Awad, Jemal Abawajy |
title_fullStr |
Security and privacy in the Internet of Things architectures, techniques, and applications edited by Ali Ismail Awad, Jemal Abawajy |
title_full_unstemmed |
Security and privacy in the Internet of Things architectures, techniques, and applications edited by Ali Ismail Awad, Jemal Abawajy |
title_short |
Security and privacy in the Internet of Things |
title_sort |
security and privacy in the internet of things architectures techniques and applications |
title_sub |
architectures, techniques, and applications |
topic |
Internet of things Security measures., Data protection. |
topic_facet |
Internet of things, Data protection., Security measures. |