Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200973 i 4500 
001    968705987 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu|||unuuu 
008    170116t20172017maua    ob    001 0 eng d 
015    GBB708177|2bnb 
016 7  018181525|2Uk 
019    968905189|a971244944|a993528166|a1017877878|a1066460515
       |a1103258782|a1129348621|a1153047127|a1235842910
       |a1240533284|a1262681324|a1392120072 
020    9780128045053|q(electronic bk.) 
020    0128045051|q(electronic bk.) 
020    0128044586 
020    9780128044582 
020    |q(paperback) 
020    |q(paperback) 
024 3  9780128044582 
029 1  AU@|b000060649942 
029 1  AU@|b000066135629 
029 1  CHBIS|b011069436 
029 1  CHNEW|b000914392 
029 1  CHVBK|b438172787 
029 1  CHVBK|b499782127 
029 1  DKDLA|b820120-katalog:9910110181305765 
029 1  GBVCP|b897159497 
029 1  UKMGB|b018181525 
035    (OCoLC)968705987|z(OCoLC)968905189|z(OCoLC)971244944
       |z(OCoLC)993528166|z(OCoLC)1017877878|z(OCoLC)1066460515
       |z(OCoLC)1103258782|z(OCoLC)1129348621|z(OCoLC)1153047127
       |z(OCoLC)1235842910|z(OCoLC)1240533284|z(OCoLC)1262681324
       |z(OCoLC)1392120072 
037    CL0500000826|bSafari Books Online 
037    7B2D5E59-74CF-4000-9656-9B42EB326B52|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    N$T|beng|erda|epn|cN$T|dIDEBK|dEBLCP|dN$T|dYDX|dOCLCF|dCOO
       |dUMI|dMERUC|dUIU|dWAU|dTEFOD|dSTF|dMERER|dOCLCQ|dVT2|dOTZ
       |dOCLCQ|dUPM|dOCLCA|dREB|dMCW|dD6H|dEZC|dU3W|dCEF|dKSU
       |dEZ9|dRRP|dOCLCQ|dDEBBG|dOCLCQ|dWYU|dAU@|dUKMGB|dOCLCQ
       |dS2H|dOCLCO|dOCLCQ|dSFB|dINARC|dOCLCQ|dOCLCO 
049    INap 
082 04 004.67/8 
082 04 004.67/8|223 
099    eBook O'Reilly for Public Libraries 
100 1  Li, Shancang,|eauthor. 
245 10 Securing the internet of things /|cShancang Li, Li Da Xu ;
       Imed Romdhani, contributor.|h[O'Reilly electronic 
       resource] 
264  1 Cambridge, MA :|bSyngress, an imprint of Elsevier,|c[2017]
264  4 |c©2017 
300    1 online resource (144 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  1. Introduction: securing the Internet of Things -- 2. 
       Security architecture in the Internet of Things -- 3. 
       Security and vulnerability in the Internet of Things -- 4.
       IoT node authentication -- 5. Security requirements in IoT
       architecture -- 6. Security in enabling technologies -- 7.
       Existing security scheme for IoT -- 8. Security concerns 
       in social IoT -- 9. Confidentiality and security for IoT 
       based healthcare. 
520    "Securing the Internet of Things provides network and 
       cybersecurity researchers and practitioners with both the 
       theoretical and practical knowledge they need to know 
       regarding security in the Internet of Things (IoT). This 
       booming field, moving from strictly research to the 
       marketplace, is advancing rapidly, yet security issues 
       abound. This book explains the fundamental concepts of IoT
       security, describing practical solutions that account for 
       resource limitations at IoT end-node, hybrid network 
       architecture, communication protocols, and application 
       characteristics. Highlighting the most important potential
       IoT security risks and threats, the book covers both the 
       general theory and practical implications for people 
       working in security in the Internet of Things. Helps 
       researchers and practitioners understand the security 
       architecture in IoT and the state-of-the-art in IoT 
       security countermeasures ; Explores how the threats in IoT
       are different from traditional ad hoc or infrastructural 
       networks ; Provides a comprehensive discussion on the 
       security challenges and solutions in RFID, WSNs, and IoT ;
       Contributed material by Dr. Imed Romdhani"--Provided by 
       publisher 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Internet of things. 
650  0 Computer networks|xSecurity measures. 
650  0 Computer security. 
650  2 Computer Security 
650  6 Internet des objets. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Sécurité informatique. 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Computer security|2fast 
650  7 Internet of things|2fast 
700 1  Xu, Li D.,|eauthor. 
700 1  Romdhani, Imed,|econtributor. 
776 08 |iPrint version:|aLi, Shancang.|tSecuring the internet of 
       things.|dCambridge, MA : Syngress, an imprint of Elsevier,
       [2017]|z9780128044582|w(OCoLC)972324781 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780128045053/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    EBL - Ebook Library|bEBLB|nEBL4786871 
938    EBSCOhost|bEBSC|n1144877 
938    ProQuest MyiLibrary Digital eBook Collection|bIDEB
       |ncis37359814 
938    YBP Library Services|bYANK|n13370962 
938    Internet Archive|bINAR|nsecuringinternet0000lish 
994    92|bJFN