Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 137,33
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 142,78
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. In.
EUR 142,63
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. CHARLES A. KAMHOUA, PHD, is a Senior Electronics Engineer at the U.S. Army Research Laboratory s Network Security Branch.LAURENT L. NJILLA, PHD, is a researcher at the U.S. Army Research Laboratory s Information Directorate/Cyber Assurance Branch.ALEXANDER .
EUR 200,13
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. 2020. 1st Edition. Hardcover. . . . . . Books ship from the US and Ireland.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 191,81
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 600 pages. 9.25x6.00x1.50 inches. In Stock.
EUR 197,34
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware - An essential guide to the modeling and design techniques for securing systems that utilize the Internet of ThingsModeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors--noted experts on the topic--also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:\* Presents information on game-theory analysis of cyber deception\* Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation\* Contains contributions from an international panel of experts\* Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart citiesWritten for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.