Grafik für das Drucken der Seite Abbildung von Naseer Qureshi / Newe | Cybersecurity Vigilance and Security Engineering of Internet of Everything | 1. Auflage | 2023 | beck-shop.de

Naseer Qureshi / Newe / Jeon / Chehri

Cybersecurity Vigilance and Security Engineering of Internet of Everything

lieferbar ca. 10 Tage als Sonderdruck ohne Rückgaberecht

181,89 €

Preisangaben inkl. MwSt. Abhängig von der Lieferadresse kann die MwSt. an der Kasse variieren. Weitere Informationen

auch verfügbar als eBook (PDF) für 171,19 €

Fachbuch

Buch. Hardcover

2023

xvii, 220 S. 5 s/w-Abbildungen, 38 Farbabbildungen, Bibliographien.

In englischer Sprache

Springer. ISBN 978-3-031-45161-4

Format (B x L): 15,5 x 23,5 cm

Gewicht: 530 g

Das Werk ist Teil der Reihe: Internet of Things

Produktbeschreibung

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms. - Discusses cyber security threats and vulnerabilities, security vigilance, and security engineering for IoE networks; - Provides prevention techniques like intrusion detection, trust evaluation, crypto, and hashing privacy solutions; - Features tips to secure networks from security attacks like repudiation, tampering, spoofing, and elevation of privilege.

Topseller & Empfehlungen für Sie

Ihre zuletzt angesehenen Produkte

Autorinnen/Autoren

  • Rezensionen

    Dieses Set enthält folgende Produkte:
      Auch in folgendem Set erhältlich:
      • nach oben

        Ihre Daten werden geladen ...