Imagen de portada de Amazon
Imagen de Amazon.com

Performance and security for the Internet of Things : emerging wireless technologies / Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy

Por: Colaborador(es): Idioma: Inglés Editor: New York : McGraw-Hill, [2021]Descripción: 1 online resource (xv, 185 pages)Tipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de soporte:
  • recurso en línea
ISBN:
  • 9781260460360
Tema(s): Clasificación CDD:
  • 004.678
Recursos en línea: Resumen: "A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This book is a concise guide to securing wireless IoT systems at the communications level, covering wireless spectrum sharing systems, smart grid communications, machine-to-machine communications, and uplink/downlink communications for IoT applications. The methods, optimization problems, mathematical solutions, algorithms, and programming codes in the book can be applied directly or extended as countermeasures for different IoT vulnerabilities."--Publisher's description
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Estado Fecha de vencimiento Código de barras Reserva de ítems
E-Book E-Book Sede Quito Col General 004.678 (Navegar estantería(Abre debajo)) Disponible Ebook00824
Total de reservas: 0

Includes bibliographical references (page 153-172) and index.

"A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This book is a concise guide to securing wireless IoT systems at the communications level, covering wireless spectrum sharing systems, smart grid communications, machine-to-machine communications, and uplink/downlink communications for IoT applications. The methods, optimization problems, mathematical solutions, algorithms, and programming codes in the book can be applied directly or extended as countermeasures for different IoT vulnerabilities."--Publisher's description

Description based on print version record and CIP data provided by publisher; resource not viewed.

No hay comentarios en este titulo.

para colocar un comentario.
Recursos Repositorio Herramienta Guias Normativa


 Nuestras Alianzas