Libros sobre el tema "Security IoT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Security IoT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Chaki, Rituparna y Debdutta Barman Roy. Security in IoT. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003149507.
Texto completoNayak, Padmalaya, Niranjan Ray y P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003124252.
Texto completoHancke, Gerhard P. y Konstantinos Markantonakis, eds. Radio Frequency Identification and IoT Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62024-4.
Texto completoMitton, Nathalie, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon y Patrick Capolsini, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52727-7.
Texto completoFortino, Giancarlo, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi y Alban Gabillon, eds. Interoperability, Safety and Security in IoT. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7.
Texto completoDehghantanha, Ali y Kim-Kwang Raymond Choo, eds. Handbook of Big Data and IoT Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10543-3.
Texto completoJeyanthi, N., Ajith Abraham y Hamid Mcheick, eds. Ubiquitous Computing and Computing Security of IoT. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-01566-4.
Texto completoJiang, Hongbo, Hongyi Wu y Fanzi Zeng, eds. Edge Computing and IoT: Systems, Management and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73429-9.
Texto completoAbdel-Basset, Mohamed, Nour Moustafa, Hossam Hawash y Weiping Ding. Deep Learning Techniques for IoT Security and Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89025-4.
Texto completoKieras, Timothy, Junaid Farooq y Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Texto completoMahmood, Zaigham, ed. Security, Privacy and Trust in the IoT Environment. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18075-1.
Texto completoAbd El-Latif, Ahmed A., Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk y Brij B. Gupta, eds. Security and Privacy Preserving for IoT and 5G Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85428-7.
Texto completoMakkar, Aaisha y Neeraj Kumar, eds. Deep Learning for Security and Privacy Preservation in IoT. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6186-0.
Texto completoLiyanage, Madhusanka, An Braeken, Pardeep Kumar y Mika Ylianttila, eds. IoT Security. Wiley, 2019. http://dx.doi.org/10.1002/9781119527978.
Texto completoGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Buscar texto completoGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Buscar texto completoSecurity in Iot. Taylor & Francis Group, 2022.
Buscar texto completoChaki, Rituparna y Debdutta Barman Roy. Security in IoT. CRC Press LLC, 2021.
Buscar texto completoGilchrist, Alasdair. IoT Security Issues. De Gruyter, Inc., 2017.
Buscar texto completoSecurity in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Buscar texto completoKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila y An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Limited, John, 2019.
Buscar texto completoSecurity in IoT Social Networks. Elsevier, 2021. http://dx.doi.org/10.1016/c2019-0-03214-1.
Texto completoPatel, Harshita y Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Buscar texto completoKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila y An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Incorporated, John, 2019.
Buscar texto completoLe, Dac-Nhuong, Souvik Pal y Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Buscar texto completoAl-Turjman, Fadi. Security in Iot-Enabled Spaces. Taylor & Francis Group, 2020.
Buscar texto completoPatel, Harshita y Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Buscar texto completoAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Buscar texto completoKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila y An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Limited, John, 2020.
Buscar texto completoKumar, Pardeep, Madhusanka Liyanage, Mika Ylianttila y An Braeken. IoT Security: Advances in Authentication. Wiley & Sons, Incorporated, John, 2019.
Buscar texto completoAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Buscar texto completoAl-Turjman, Fadi. Security in IoT-Enabled Spaces. Taylor & Francis Group, 2019.
Buscar texto completoLe, Dac-Nhuong, Souvik Pal y Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Buscar texto completoPatel, Harshita y Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Buscar texto completoIoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Buscar texto completoAl-Turjman, Fadi. Security in Iot-Enabled Spaces. Taylor & Francis Group, 2019.
Buscar texto completoAl-Turjman, Fadi y B. D. Deebak. Security in IoT Social Networks. Elsevier Science & Technology Books, 2020.
Buscar texto completoLe, Dac-Nhuong, Souvik Pal y Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Buscar texto completoBhushan, Bharat, Narayan C. Debnath y Sudhir Kumar Sharma. Iot Security Paradigms and Applications. Taylor & Francis Group, 2020.
Buscar texto completoLe, Dac-Nhuong, Souvik Pal y Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Buscar texto completoAl-Turjman, Fadi y B. D. Deebak. Security in IoT Social Networks. Elsevier Science & Technology, 2020.
Buscar texto completoPatel, Harshita y Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Buscar texto completoDhondge, Kaustubh. Lifecycle IoT Security for Engineers. Artech House, 2021.
Buscar texto completoPatel, Harshita y Ghanshyam Singh Thakur. Blockchain Applications in IoT Security. IGI Global, 2020.
Buscar texto completoChaki, Rituparna y Debdutta Barman Roy. Security in IoT: The Changing Perspective. Taylor & Francis Group, 2022.
Buscar texto completoGremban, Keith, Stephan Gerali, Robert Douglass y Ananthram Swami. IoT for Defense and National Security. Wiley & Sons, Incorporated, John, 2022.
Buscar texto completoGremban, Keith, Stephan Gerali, Robert Douglass y Ananthram Swami. IoT for Defense and National Security. Wiley & Sons, Incorporated, John, 2022.
Buscar texto completoIoT for Defense and National Security. Wiley & Sons, Limited, John, 2023.
Buscar texto completoNayak, Padmalaya, P. Ravichandran y Niranjan Ray. IoT Applications, Security Threats, and Countermeasures. Taylor & Francis Group, 2021.
Buscar texto completoNayak, Padmalaya, P. Ravichandran y Niranjan Ray. IoT Applications, Security Threats, and Countermeasures. Taylor & Francis Group, 2021.
Buscar texto completo