買這商品的人也買了...
- 
                
                   C++ Primer, 4/e (中文版) C++ Primer, 4/e (中文版)$990$891
- 
                
                   大話設計模式 大話設計模式$620$490
- 
                
                   $1,680Clean Code: A Handbook of Agile Software Craftsmanship (Paperback) $1,680Clean Code: A Handbook of Agile Software Craftsmanship (Paperback)
- 
                
                   Oracle DBA 手記:資料庫診斷案例與效能調校實戰 Oracle DBA 手記:資料庫診斷案例與效能調校實戰$580$458
- 
                
                   JavaScript 大全, 6/e (JavaScript: The Definitive Guide: Activate Your Web Pages, 6/e) JavaScript 大全, 6/e (JavaScript: The Definitive Guide: Activate Your Web Pages, 6/e)$1,200$948
- 
                
                   SQL Server 效能調校 SQL Server 效能調校$450$351
- 
                
                   動畫圖解資料結構, 2/e 動畫圖解資料結構, 2/e$490$417
- 
                
                   隨機騙局:潛藏在生活與市場中的機率陷阱 (Fooled by Randomness) 隨機騙局:潛藏在生活與市場中的機率陷阱 (Fooled by Randomness)$380$323
- 
                
                   ASP.NET MVC 5 網站開發美學 ASP.NET MVC 5 網站開發美學$780$616
- 
                
                   機率陷阱:從購物、保險到用藥,如何做出最萬無一失的選擇?(Risk Savvy: How to Make Good Decisions) 機率陷阱:從購物、保險到用藥,如何做出最萬無一失的選擇?(Risk Savvy: How to Make Good Decisions)$360$306
- 
                
                   精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages) 精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages)$780$616
- 
                
                   完整學會 Git, GitHub, Git Server 的24堂課 完整學會 Git, GitHub, Git Server 的24堂課$360$284
- 
                
                   Visual C# 2015 入門與應用 Visual C# 2015 入門與應用$560$476
- 
                
                   職業駭客的告白 : 軟體反組譯、木馬病毒與入侵翻牆竊密 職業駭客的告白 : 軟體反組譯、木馬病毒與入侵翻牆竊密$620$484
- 
                
                   使用者故事對照 (User Story Mapping: Discover the Whole Story, Build the Right Product) 使用者故事對照 (User Story Mapping: Discover the Whole Story, Build the Right Product)$580$458
- 
                
                   Python 程式設計實務-從初學到活用 Python 開發技巧的16堂課 Python 程式設計實務-從初學到活用 Python 開發技巧的16堂課$560$437
- 
                
                   讓響應式(RWD)網頁設計變簡單:Bootstrap開發速成 (附135分鐘專題影音教學) 讓響應式(RWD)網頁設計變簡單:Bootstrap開發速成 (附135分鐘專題影音教學)$420$332
- 
                
                   Docker 錦囊妙計 (Docker Cookbook) Docker 錦囊妙計 (Docker Cookbook)$680$537
- 
                
                   Python 機器學習 (Python Machine Learning) Python 機器學習 (Python Machine Learning)$580$452
- 
                
                   寫給 PM、RD 與設計師看的設計需求分析─使用者想要的應用程式都是這樣打造出來的 (Designing the Requirements: Building Applications that the User Wants and Needs) 寫給 PM、RD 與設計師看的設計需求分析─使用者想要的應用程式都是這樣打造出來的 (Designing the Requirements: Building Applications that the User Wants and Needs)$580$458
- 
                
                  .jpg) Python + Spark 2.0 + Hadoop 機器學習與大數據分析實戰 Python + Spark 2.0 + Hadoop 機器學習與大數據分析實戰$680$530
- 
                
                   網站擷取|使用 Python (Web Scraping with Python: Collecting Data from the Modern Web) 網站擷取|使用 Python (Web Scraping with Python: Collecting Data from the Modern Web)$580$458
- 
                
                   Python 初學特訓班 (附250分鐘影音教學/範例程式) Python 初學特訓班 (附250分鐘影音教學/範例程式)$480$379
- 
                
                   今天不學機器學習,明天就被機器取代:從 Python 入手+演算法 今天不學機器學習,明天就被機器取代:從 Python 入手+演算法$590$502
- 
                
                   IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things$1,925$1,887
商品描述
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?"
The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions.
The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
商品描述(中文翻譯)
物聯網(IoT)引起了學術界和產業界的強烈興趣。不幸的是,它也引起了駭客的注意。《物聯網(IoT)的安全性與隱私:模型、演算法與實作》匯集了來自全球的一些頂尖物聯網安全專家,他們分享了有關不同物聯網安全方面的知識。本書回答了「我們如何使用有效的演算法、模型和實作來涵蓋物聯網安全的四個重要方面,即保密性、認證、完整性和可用性?」這個問題。
本書分為五個部分,涵蓋攻擊與威脅、隱私保護、信任與認證、物聯網數據安全以及社會意識。第一部分介紹了各類物聯網攻擊和威脅,並展示了對抗這些攻擊的對策原則。它詳細介紹了特定攻擊,例如惡意軟體傳播和Sybil攻擊。第二部分針對與數據收集和分發相關的隱私保護問題,包括醫療記錄。作者以智慧建築為例,討論隱私保護解決方案。
第三部分描述了物聯網基礎設施中的不同信任模型,討論對物聯網數據的存取控制,並提供物聯網認證問題的調查。第四部分強調物聯網數據計算過程中的安全問題。它介紹了物聯網數據處理中的計算安全問題、時間序列數據聚合中的安全設計、數據傳輸的密鑰生成,以及數據存取過程中的具體安全協議。第五部分則考慮政策和人類行為特徵,涵蓋基於社會情境的隱私和信任設計,以及物聯網中的基於政策的知情同意。

 
     
     
     
     
     
     
    
 
     
     
     
     
     
     
     
     
     
     
     
     
    
