Security Breaches and Threat Prevention in the Internet of Things
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Internet of things, for things, and by things
by: Chaudhuri, Abhik
Published: (2019)
by: Chaudhuri, Abhik
Published: (2019)
Breaching the fortress wall
by: Jackson
by: Jackson
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Cryptographic Security Solutions for the Internet of Things
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Practical Aviation Security: Predicting and Preventing Future Threats
by: Jeffrey Price (Author), Jeffrey Forrest
by: Jeffrey Price (Author), Jeffrey Forrest
Remedies for breach of EC law
by: lh
by: lh
Internet of things challenges, advances, and applications
Published: (2018)
Published: (2018)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
The internet of things what everyone needs to know
by: Shackelford, Scott J.
Published: (2020)
by: Shackelford, Scott J.
Published: (2020)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Applied Approach to Privacy and Security for the Internet of Things
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Developing next-generation countermeasures for homeland security threat prevention
Published: (2016)
Published: (2016)
Cybersecurity Basics: Cyber Attacks, Network Security, And Threat Prevention
by: Pete Michaels
by: Pete Michaels
The Internet of things foundation for smart cities, eHealth and ubiquitous computing
Published: (2018)
Published: (2018)
Computational Intelligence in the Internet of Things
Security and privacy in internet of things (IoTs) models, algorithms, and implementations
Published: (2016)
Published: (2016)
Internet of things (IoT) technologies, applications, challenges, and solutions
Published: (2018)
Published: (2018)
Designing the Internet of Things / Adrian McEwen, Hakim Cassimally
by: McEwen, Adrian, et al.
Published: (2014)
by: McEwen, Adrian, et al.
Published: (2014)
The Eve of the Revolution; A Chronicle of the Breach with England
by: Becker, Carl L., 1873-1945 (Carl Lotus)
Published: (2002)
by: Becker, Carl L., 1873-1945 (Carl Lotus)
Published: (2002)
Internet-of-Things (IoT) Systems : Architectures, Algorithms, Methodologies /
by: Serpanos, Dimitrios Nikolaou, et al.
Published: (2018)
by: Serpanos, Dimitrios Nikolaou, et al.
Published: (2018)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Understanding new security threats
Published: (2019)
Published: (2019)
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013)
by: Purpura, Philip P., 1950-
Published: (2013)
Exploring the Convergence of Big Data and the Internet of Things
Internet of Things (IoT) Applications for Enterprise Productivity
The Impact Of Internet Of Things On Warehouse Inventory Performance
by: Nurul Atikah Binti Mohd Nazli
Published: (2023)
by: Nurul Atikah Binti Mohd Nazli
Published: (2023)
Victims as security threats refugee impact on host state security in Africa
by: Mogire, Edward O.
Published: (2009)
by: Mogire, Edward O.
Published: (2009)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Building Arduino Projects for the Internet of Things : Experiments with Real-World Applications /
by: Javed, Adeel
Published: (2016)
by: Javed, Adeel
Published: (2016)
Threat talk the comparative politics of internet addiction
by: Manjikian, Mary
Published: (2016)
by: Manjikian, Mary
Published: (2016)
Surveillance and threat detection prevention versus mitigation
by: Kirchner, Richard, Jr
Published: (2014)
by: Kirchner, Richard, Jr
Published: (2014)
Data Breaches in The Social Media And The Impact Towards USA And Malaysia Security: A Comparison Study
by: Muzaiham Muhamad
by: Muzaiham Muhamad
Threat modeling designing for security
by: Shostack, Adam
Published: (2014)
by: Shostack, Adam
Published: (2014)
Cyber-security and threat politics US efforts to secure the information age
by: Dunn Cavelty, Myriam
Published: (2007)
by: Dunn Cavelty, Myriam
Published: (2007)
International terrorism and threats to security managerial and organizational challenges
Published: (2008)
Published: (2008)
The terrorist threat to the maritime security of the UAE
by: Burke, Paul
Published: (2010)
by: Burke, Paul
Published: (2010)
Predictive Intelligence Using Big Data and the Internet of Things
Handbook of Research on the Internet of Things Applications in Robotics and Automation
Similar Items
-
Internet of things, for things, and by things
by: Chaudhuri, Abhik
Published: (2019) -
Breaching the fortress wall
by: Jackson -
Cryptographic security solutions for the Internet of Things
Published: (2019) - Cryptographic Security Solutions for the Internet of Things
-
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)


