0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,514 Discovery Miles 45 140 Ships in 18 - 22 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R2,094 Discovery Miles 20 940 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Ubiquitous Computing and Computing Security of IoT (Paperback, Softcover reprint of the original 1st ed. 2019): N. Jeyanthi,... Ubiquitous Computing and Computing Security of IoT (Paperback, Softcover reprint of the original 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Elphie - A Wicked Childhood
Gregory Maguire Paperback R440 R393 Discovery Miles 3 930
Iron Flame - The Empyrean: Book 2
Rebecca Yarros Hardcover R610 R533 Discovery Miles 5 330
End Game
Jeffrey Archer Hardcover R389 R299 Discovery Miles 2 990
The Hunger Games: 4-Book Collection…
Suzanne Collins Paperback R1,503 R1,220 Discovery Miles 12 200
The Party
Elizabeth Day Paperback  (1)
R290 R264 Discovery Miles 2 640
Blood Kiss
J.R. Ward Paperback  (1)
R219 R195 Discovery Miles 1 950
Katvis
Annelie Botes Paperback  (1)
R360 R332 Discovery Miles 3 320
The Watchmaker's Hand
Jeffery Deaver Paperback R479 Discovery Miles 4 790
Sleeper
Mike Nicol Paperback R300 R277 Discovery Miles 2 770
Small Mercies
Dennis Lehane Paperback R436 R398 Discovery Miles 3 980

 

Partners