Livros sobre o tema "Sécurités des IoT"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Sécurités des IoT".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Parikka, Jussi. Digital contagions: A media archaeology of computer viruses. New York: Peter Lang, 2007.
Encontre o texto completo da fonteKevin, Behr, e Spafford George, eds. The phoenix project: A novel about IT, DevOps, and helping your business win. Portland, Or: IT Revolution Press, 2013.
Encontre o texto completo da fonteAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Encontre o texto completo da fonteMcDougall, Allan. Transportation systems security. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2008.
Encontre o texto completo da fonteAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2a ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Encontre o texto completo da fonteKatz, Jonathan. Introduction to modern cryptography. Boca Raton: Chapman & Hall/CRC, 2008.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. Sudbury, Ont: École des traducteurs et interprètes, Université Laurentienne, 1993.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. 3a ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2008.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. Englewood Cliffs, N.J: Prentice Hall, 1992.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. London: Prentice Hall International, 1992.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern operating systems. 2a ed. Upper Saddle River, NJ: Prentice Hall International, 2001.
Encontre o texto completo da fonteTanenbaum, Andrew S. Modern Operating Systems: Second Edition. 2a ed. Upper Saddle River, N.J: Prentice Hall, 2001.
Encontre o texto completo da fonteIot. Taylor & Francis Group, 2022.
Encontre o texto completo da fonteIoT Architect's Guide to Attainable Security and Privacy: The IoT Architect's Guide to Attainable. Auerbach Publishers, Incorporated, 2023.
Encontre o texto completo da fonteIoT Architect's Guide to Attainable Security and Privacy. Auerbach Publishers, Incorporated, 2019.
Encontre o texto completo da fonteWheeler, David M., J. C. Wheeler e Damilare D. Fagbemi. IoT Architect's Guide to Attainable Security and Privacy. Auerbach Publishers, Incorporated, 2019.
Encontre o texto completo da fonteWheeler, David M., Oluwadamilare Oluwadamilola Fagbemi e J. C. Wheeler. IoT Architect's Guide to Attainable Security and Privacy. Taylor & Francis Group, 2019.
Encontre o texto completo da fonteLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteLe, Dac-Nhuong, Souvik Pal e Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteIoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteIot Applications Security Threats and Countermeasures. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteNayak, Padmalaya, Niranjan K. Ray e P. Ravichandran. IoT Applications, Security Threats, and Countermeasures. CRC Press LLC, 2021.
Encontre o texto completo da fonteNayak, Padmalaya, P. Ravichandran e Niranjan Ray. IoT Applications, Security Threats, and Countermeasures. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteCybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. CRC Press, 2021.
Encontre o texto completo da fonteCybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications. CRC Press LLC, 2021.
Encontre o texto completo da fonteSecuring IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing Iot and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteKhan, Firoz, T. Poongodi, Alagan Anpalagan e Vijayalakshmi Saravanan. Securing IoT and Big Data: Next Generation Intelligence. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Encontre o texto completo da fontePrivacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the Iot. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteAgarwal, Shivani, Sandhya Makkar e Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Encontre o texto completo da fonteSaini, Hemraj, Om Prakash Singh e Gautam Kumar. Cybersecurity: Ambient Technologies, IoT, and Industry 4. 0 Implications. Taylor & Francis Group, 2021.
Encontre o texto completo da fonteUnderstanding Cyberrisks in IoT: When Smart Things Turn Against You. Business Expert Press, 2019.
Encontre o texto completo da fonteAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Encontre o texto completo da fonteAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Encontre o texto completo da fonteAgrawal, Dharma P., Kuan-Ching Li e Brij B. Gupta. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Encontre o texto completo da fonteAgrawal, Dharma P., Kuan-Ching Li e Brij Gupta. Recent Advances in Security Privacy and Trust for Internet-Of-things (iot) and Cyber-physical Systems (cps). Taylor & Francis Group, 2020.
Encontre o texto completo da fonteRecent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS). Taylor & Francis Group, 2020.
Encontre o texto completo da fonteIoT Technologies in Smart-Cities: From Sensors to Big Data, Security and Trust. Institution of Engineering & Technology, 2020.
Encontre o texto completo da fonteSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2001.
Encontre o texto completo da fonteSecurity in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks). Routledge, 2000.
Encontre o texto completo da fonteThe Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. Portland, USA: IT Revolutions, 2018.
Encontre o texto completo da fonteBehr, Kevin, George Spafford e Gene Kim. Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win. IT Revolution Press, 2013.
Encontre o texto completo da fonte