0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,726 Discovery Miles 47 260 Ships in 12 - 17 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,188 Discovery Miles 11 880 Ships in 12 - 17 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,865 Discovery Miles 18 650 Ships in 12 - 17 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Ubiquitous Computing and Computing Security of IoT (Paperback, Softcover reprint of the original 1st ed. 2019): N. Jeyanthi,... Ubiquitous Computing and Computing Security of IoT (Paperback, Softcover reprint of the original 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
White Glo Tight Squeeze Precise Clean…
R67 Discovery Miles 670
Trade Professional Drill Kit Cordless…
 (9)
R2,223 Discovery Miles 22 230
Roald Dahl: 16-Book Collection
Roald Dahl Paperback R1,299 R985 Discovery Miles 9 850
Fly Repellent ShooAway (Black)
 (6)
R299 R259 Discovery Miles 2 590
Cable Guys Controller and Smartphone…
R399 R349 Discovery Miles 3 490
The Hunger Games 4 Book Paperback Box…
Suzanne Collins Paperback R818 Discovery Miles 8 180
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,775 Discovery Miles 17 750
Huntlea Koletto - Matlow Pet Bed…
R969 R562 Discovery Miles 5 620
Bostik Clear in Box (25ml)
R26 Discovery Miles 260
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, … Blu-ray disc R313 Discovery Miles 3 130

 

Partners