122,95 €
122,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
61 °P sammeln
122,95 €
122,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
61 °P sammeln
Als Download kaufen
122,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
61 °P sammeln
Jetzt verschenken
122,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
61 °P sammeln
  • Format: ePub

Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applications, and the difficulties in securing such an expansive infrastructure. Readers gain insight into various security vulnerabilities present at each layer of IoT architecture, alongside viable security solutions. The book thoroughly examines distinct access control and authentication strategies, including intrusion detection systems (IDS), misuse detection,…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 13.38MB
Produktbeschreibung
Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applications, and the difficulties in securing such an expansive infrastructure. Readers gain insight into various security vulnerabilities present at each layer of IoT architecture, alongside viable security solutions. The book thoroughly examines distinct access control and authentication strategies, including intrusion detection systems (IDS), misuse detection, anomaly detection, DNS-based security solutions, and the implementation of artificial intelligence (AI) in cognitive IoT security.Additionally, the book explores microservice architecture for distributed IoT security and blockchain-based IoT security solutions. - Covers the basic concepts of IoT security, including vulnerabilities, authentication, and detection - Discusses advanced research areas such as light-weighted authentication mechanism, blockchain, and AI-based security solutions - Contains case studies analyzing IoT attacks

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.