Cyber-assurance for the internet of things / (Record no. 74478)

000 -LEADER
fixed length control field 05652nam a2200709 i 4500
001 - CONTROL NUMBER
control field 7753052
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712205939.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170210s2016 nju ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119193784
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
082 04 - CLASSIFICATION NUMBER
Call Number 004.67/8
245 00 - TITLE STATEMENT
Title Cyber-assurance for the internet of things /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (520 pages).
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Embedded Design Security. Certified Security by Design for the Internet of Things / Shiu-Kai Chin -- Cyber-Assurance Through Embedded Security for the Internet of Things / Tyson T Brooks, Joon Park -- A Secure Update Mechanism for Internet of Things Devices / Martin Goldberg -- Trust Impact. Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective / M Bala Krishna -- The Impact of IoT Devices on Network Trust Boundaries / Nicole Newmeyer -- Wearable Automation Provenance. Wearable IoT Computing: Interface, Emotions, Wearer'S Culture, and Security/Privacy Concerns / Robert Mccloud, Martha Lerski, Joon Park, Tyson T Brooks -- On Vulnerabilities of IoT-Based Consumer-Oriented Closed-Loop Control Automation Systems / Martin Murillo -- Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety / Mark Underwood -- Cloud Artificial Intelligence Cyber-Physical Systems. A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture / Tyson T Brooks, Lee McKnight -- An Artificial Intelligence Perspective on Ensuring Cyber-Assurance for the Internet of Things / Utku Kose -- Perceived Threat Modeling for Cyber-Physical Systems / Christopher Leberknight.
520 ## - SUMMARY, ETC.
Summary, etc Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. . Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications. Aids readers in understanding how to design and build cyber-assurance into the IoT. Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance. Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Internet of things
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Brooks, Tyson T.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7753052
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Hoboken, New Jersey :
-- Wiley :
-- IEEE Press,
-- [2017]
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2016]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Online resource; title from PDF title page (John Wiley, viewed December 29, 2016).
695 ## -
-- Actuators
695 ## -
-- Automation
695 ## -
-- Computer architecture
695 ## -
-- Cyber-physical systems
695 ## -
-- Floods
695 ## -
-- Hydroelectric power generation
695 ## -
-- Information technology
695 ## -
-- Internet
695 ## -
-- Intrusion detection
695 ## -
-- Marine animals
695 ## -
-- Process control
695 ## -
-- Protocols
695 ## -
-- Reservoirs
695 ## -
-- Rivers
695 ## -
-- Software systems

No items available.