Libri sul tema "Sécurités des IoT"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Sécurités des IoT".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.
Cerca il testo completoKevin, Behr, e Spafford George, a cura di. The phoenix project: A novel about IT, DevOps, and helping your business win. Portland, Or: IT Revolution Press, 2013.
Cerca il testo completoAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Cerca il testo completoMcDougall, Allan. Transportation systems security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2008.
Cerca il testo completoAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Cerca il testo completoKatz, Jonathan. Introduction to modern cryptography. Boca Raton: Chapman & Hall/CRC, 2008.
Cerca il testo completoTanenbaum, Andrew S. Modern operating systems. Sudbury, Ont: École des traducteurs et interprètes, Université Laurentienne, 1993.
Cerca il testo completoTanenbaum, Andrew S. Modern operating systems. 3a ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2008.
Cerca il testo completoTanenbaum, Andrew S. Modern operating systems. Englewood Cliffs, N.J: Prentice Hall, 1992.
Cerca il testo completoTanenbaum, Andrew S. Modern operating systems. London: Prentice Hall International, 1992.
Cerca il testo completoTanenbaum, Andrew S. Modern operating systems. 2a ed. Upper Saddle River, NJ: Prentice Hall International, 2001.
Cerca il testo completoTanenbaum, Andrew S. Modern Operating Systems: Second Edition. 2a ed. Upper Saddle River, N.J: Prentice Hall, 2001.
Cerca il testo completoIot. Taylor & Francis Group, 2022.
Cerca il testo completoIoT Architect's Guide to Attainable Security and Privacy: The IoT Architect's Guide to Attainable. Auerbach Publishers, Incorporated, 2023.
Cerca il testo completoIoT Architect's Guide to Attainable Security and Privacy. Auerbach Publishers, Incorporated, 2019.
Cerca il testo completoWheeler, David M., J. C. Wheeler e Damilare D. Fagbemi. IoT Architect's Guide to Attainable Security and Privacy. Auerbach Publishers, Incorporated, 2019.
Cerca il testo completoWheeler, David M., Oluwadamilare Oluwadamilola Fagbemi e J. C. Wheeler. IoT Architect's Guide to Attainable Security and Privacy. Taylor & Francis Group, 2019.
Cerca il testo completoLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Cerca il testo completoLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Cerca il testo completoLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Cerca il testo completoLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Cerca il testo completoIoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Cerca il testo completoIot Applications Security Threats and Countermeasures. Taylor & Francis Group, 2021.
Cerca il testo completoNayak, Padmalaya, Niranjan K. Ray e P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. CRC Press LLC, 2021.
Cerca il testo completoNayak, Padmalaya, P. Ravichandran e Niranjan Ray. IoT Applications, Security Threats, and Countermeasures. Taylor & Francis Group, 2021.
Cerca il testo completoCybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. CRC Press, 2021.
Cerca il testo completoCybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. CRC Press LLC, 2021.
Cerca il testo completoSecuring IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Cerca il testo completoKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Cerca il testo completoKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing Iot and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Cerca il testo completoKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Cerca il testo completoAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Cerca il testo completoPrivacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Cerca il testo completoAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the Iot. Taylor & Francis Group, 2020.
Cerca il testo completoSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Cerca il testo completoAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Cerca il testo completoSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Cerca il testo completoAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Cerca il testo completoSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Cerca il testo completoUnderstanding Cyberrisks in IoT: When Smart Things Turn Against You. Business Expert Press, 2019.
Cerca il testo completoAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Cerca il testo completoAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Cerca il testo completoAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Cerca il testo completoAgrawal, Dharma P., Kuan-Ching Li e Brij Gupta. Recent Advances in Security Privacy and Trust for Internet-Of-things (iot) and Cyber-physical Systems (cps). Taylor & Francis Group, 2020.
Cerca il testo completoRecent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Cerca il testo completoIoT Technologies in Smart-Cities: From Sensors to Big Data, Security and Trust. Institution of Engineering & Technology, 2020.
Cerca il testo completoSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2001.
Cerca il testo completoSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2000.
Cerca il testo completoThe Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. Portland, USA: IT Revolutions, 2018.
Cerca il testo completoBehr, Kevin, George Spafford e Gene Kim. Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. IT Revolution Press, 2013.
Cerca il testo completo