LEADER 00000cam a2200973 i 4500 001 968705987 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu|||unuuu 008 170116t20172017maua ob 001 0 eng d 015 GBB708177|2bnb 016 7 018181525|2Uk 019 968905189|a971244944|a993528166|a1017877878|a1066460515 |a1103258782|a1129348621|a1153047127|a1235842910 |a1240533284|a1262681324|a1392120072 020 9780128045053|q(electronic bk.) 020 0128045051|q(electronic bk.) 020 0128044586 020 9780128044582 020 |q(paperback) 020 |q(paperback) 024 3 9780128044582 029 1 AU@|b000060649942 029 1 AU@|b000066135629 029 1 CHBIS|b011069436 029 1 CHNEW|b000914392 029 1 CHVBK|b438172787 029 1 CHVBK|b499782127 029 1 DKDLA|b820120-katalog:9910110181305765 029 1 GBVCP|b897159497 029 1 UKMGB|b018181525 035 (OCoLC)968705987|z(OCoLC)968905189|z(OCoLC)971244944 |z(OCoLC)993528166|z(OCoLC)1017877878|z(OCoLC)1066460515 |z(OCoLC)1103258782|z(OCoLC)1129348621|z(OCoLC)1153047127 |z(OCoLC)1235842910|z(OCoLC)1240533284|z(OCoLC)1262681324 |z(OCoLC)1392120072 037 CL0500000826|bSafari Books Online 037 7B2D5E59-74CF-4000-9656-9B42EB326B52|bOverDrive, Inc. |nhttp://www.overdrive.com 040 N$T|beng|erda|epn|cN$T|dIDEBK|dEBLCP|dN$T|dYDX|dOCLCF|dCOO |dUMI|dMERUC|dUIU|dWAU|dTEFOD|dSTF|dMERER|dOCLCQ|dVT2|dOTZ |dOCLCQ|dUPM|dOCLCA|dREB|dMCW|dD6H|dEZC|dU3W|dCEF|dKSU |dEZ9|dRRP|dOCLCQ|dDEBBG|dOCLCQ|dWYU|dAU@|dUKMGB|dOCLCQ |dS2H|dOCLCO|dOCLCQ|dSFB|dINARC|dOCLCQ|dOCLCO 049 INap 082 04 004.67/8 082 04 004.67/8|223 099 eBook O'Reilly for Public Libraries 100 1 Li, Shancang,|eauthor. 245 10 Securing the internet of things /|cShancang Li, Li Da Xu ; Imed Romdhani, contributor.|h[O'Reilly electronic resource] 264 1 Cambridge, MA :|bSyngress, an imprint of Elsevier,|c[2017] 264 4 |c©2017 300 1 online resource (144 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 504 Includes bibliographical references and index. 505 0 1. Introduction: securing the Internet of Things -- 2. Security architecture in the Internet of Things -- 3. Security and vulnerability in the Internet of Things -- 4. IoT node authentication -- 5. Security requirements in IoT architecture -- 6. Security in enabling technologies -- 7. Existing security scheme for IoT -- 8. Security concerns in social IoT -- 9. Confidentiality and security for IoT based healthcare. 520 "Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures ; Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks ; Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT ; Contributed material by Dr. Imed Romdhani"--Provided by publisher 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Internet of things. 650 0 Computer networks|xSecurity measures. 650 0 Computer security. 650 2 Computer Security 650 6 Internet des objets. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures. 650 6 Sécurité informatique. 650 7 Computer networks|xSecurity measures|2fast 650 7 Computer security|2fast 650 7 Internet of things|2fast 700 1 Xu, Li D.,|eauthor. 700 1 Romdhani, Imed,|econtributor. 776 08 |iPrint version:|aLi, Shancang.|tSecuring the internet of things.|dCambridge, MA : Syngress, an imprint of Elsevier, [2017]|z9780128044582|w(OCoLC)972324781 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780128045053/?ar |zAvailable on O'Reilly for Public Libraries 938 EBL - Ebook Library|bEBLB|nEBL4786871 938 EBSCOhost|bEBSC|n1144877 938 ProQuest MyiLibrary Digital eBook Collection|bIDEB |ncis37359814 938 YBP Library Services|bYANK|n13370962 938 Internet Archive|bINAR|nsecuringinternet0000lish 994 92|bJFN