LEADER 03580oam 2200673 450 001 9910164054403321 005 20190911103517.0 010 $a1-5225-3837-2 010 $a1-5225-2297-2 024 7 $a10.4018/978-1-5225-2296-6 035 $a(OCoLC)973495644 035 $a(MiFhGG)GVRL02VF 035 $a(EXLCZ)993710000001051679 100 $a20170118h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aSecurity breaches and threat prevention in the Internet of things /$fN. Jeyanthi, R. Thandeeswaran [editors] 210 1$aHershey, PA :$cInformation Science Reference,$d[2017] 210 4$d?2017 215 $a1 online resource (xiv, 276 pages) $cillustrations (some color) 225 1 $aAdvances in Information Security, Privacy, and Ethics (AISPE) Book Series,$x1948-9749 311 $a1-5225-2296-4 320 $aIncludes bibliographical references and index. 327 $aIoT architecture / H. Parveen Sultana -- Internet of things and security perspectives: current issues and trends / Kijpokin Kasemsap -- Security in network layer of IoT: possible measures to preclude / B. Balamurugan -- Security in application layer protocols of IoT: threats and attacks / Jasmine Norman, Paul Joseph -- Security in IoT devices / N. Jeyanthi, Shreyansh Banthia, Akhil Sharma -- Security threats in autonomous vehicles / R. Thandeeswaran, Rajat Pawar, Mallika Rai -- Mechanisms to secure communications in the IoT / Azeddine Bilami, Somia Sahraoui -- IoT in healthcare: breaching security issues / Somasundaram R, Mythili Thirugnanam -- A contemplator on topical image encryption measures / Jayanta Mondal, Debabala Swain. 330 3 $a"This book provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things"--Provided by publisher. 410 0$aPremier reference source. 410 0$aAdvances in information security, privacy, and ethics (AISPE) book series. 606 $aComputer security 606 $aInternet of things 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aInformation warfare$xPrevention 606 $aCyberterrorism$xPrevention 610 $aApplication layer protocols 610 $aAutonomous vehicles 610 $aDigital forensics 610 $aEncryption measures 610 $aHealthcare security 610 $aImage encryption 610 $aSecure communications 615 0$aComputer security. 615 0$aInternet of things. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aInformation warfare$xPrevention. 615 0$aCyberterrorism$xPrevention. 676 $a004.67/8 700 $aJeyanthi$b N.$01246129 702 $aJeyanthi$b N.$f1977- 702 $aThandeeswaran$b R.$f1971- 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910164054403321 996 $aSecurity breaches and threat prevention in the internet of things$92889591 997 $aUNINA