IoT Security

IoT Security

  • SK Hafizul Islam
  • Debabrata Samanta
  • Arup Kumar Pal
  • Ummer Iqbal
Publisher:Academic PressISBN 13: 9780443341267ISBN 10: 0443341265

Paperback & Hardcover deals ―

Amazon IndiaGOFlipkart GOSnapdealGOSapnaOnlineGOJain Book AgencyGOBooks Wagon₹4,670Book ChorGOCrosswordGODC BooksGO

e-book & Audiobook deals ―

Amazon India GOGoogle Play Books ₹152Audible GO

* Price may vary from time to time.

* GO = We're not able to fetch the price (please check manually visiting the website).

Know about the book -

IoT Security is written by SK Hafizul Islam and published by Academic Press. It's available with International Standard Book Number or ISBN identification 0443341265 (ISBN 10) and 9780443341267 (ISBN 13).

IoT Security: Fundamentals and Key Enabling Technologies explores the complex interactions between Internet of Things (IoT) and the pressing need for effective cyber security solutions. Diving into real-world case studies to provide insights into implementing efficient security measures that safeguard against online dangers, this book comprehensively analyzes the challenges and possibilities presented by intelligent technologies fueling transformational change, emphasizing the crucial role cybersecurity plays in defending networks, data, and user privacy in an increasingly interconnected digital ecosystem.Coverage includes cryptographic methods, communication networks, device identity and access, data governance and privacy, as well as regulatory frameworks and standards for IoT security. Computer science researchers and engineers will benefit from this compilation of cutting-edge research and practical case studies, learning how to minimize risks for IoT and intelligent technologies. - Covers emerging application areas in IoT and possible applications of cybersecurity solutions - Presents cutting-edge blockchain-enabled applications for smart cities, cyber-physical systems, cloud computing, intelligent transportation systems, and network security - Offers both theoretical insights and applications of blockchain, edge computing, machine learning/AI, penetration testing, and collaborative security approaches