Besplatna dostava Overseas kurirskom službom iznad 59.99 €
Overseas 4.99 Pošta 4.99 DPD 5.99 GLS 3.99 GLS paketomat 3.49 Box Now 4.49

Besplatna dostava putem Box Now paketomata i Overseas kurirske službe iznad 59,99 €!

Journal of Cyber Security and Mobility 4-1

Jezik EngleskiEngleski
Knjiga Meki uvez
Knjiga Journal of Cyber Security and Mobility 4-1
Libristo kod: 09879709
Nakladnici River Publishers, siječanj 2015
The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependenc... Cijeli opis
? points 115 b
45.80
Vanjske zalihe Šaljemo za 15-20 dana

30 dana za povrat kupljenih proizvoda


Moglo bi vas zanimati i


Language of Wolves Julio Cesar Martinez Romero / Tvrdi uvez
common.buy 30.06
Eve's Apple Marie Therese Kceif / Meki uvez
common.buy 16.34
Recueil de Management Tome 1 Charles-F / Meki uvez
common.buy 28.24
Old Whiskey and Young Women R Marc Kantrowitz / Tvrdi uvez
common.buy 21.88
Die Ungarische Strafprozessordnung Erich Heller / Tvrdi uvez
common.buy 174.95
Report of the Board of Regents Smithsonian Institution / Tvrdi uvez
common.buy 48.82

The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are resilient and trustworthy. Almost universal availability is expected, yet individual devices will routinely fail and/or be compromised. Despite this, the services should be resilient and trustworthy. The environments where the devices will be deployed will range from protected and controlled environments to potentially very hostile environments where the exposure is extreme. The cyber security landscape has changed drastically over the last decade. We have adversaries engaging in cyber warfare, organized crime, indus- trial espionage, petty/opportunistic theft, and privacy invasions. Privacy has become more important, which is by many seen as a prerequisite for human trust in IoT systems. For the IoT systems to remain trustworthy, they need to have credible defenses and be able to detect and respond to incidents. We have four contributions to this special issue. The first contribution, "Torrent-based Dissemination in Infrastructure-less Wireless Networks" by Kyriakos Manousakis et al, has its roots in peer-to-peer mobile ad hoc networks. This contribution highlights robustness in content dissemination in peer-to-peer mobile ad hoc networks. These networks are subject to disruptions due to erratic link performance and intermittent connectivity. The approach used, called SISTO, is a fully distributed and torrent-based solution. The authors highlight four main features: 1) freedom from reliance on infrastructure; 2) network and topology aware selection of information sources; 3) robust multiple-path routing of content via a proactive peer selec- tion technique; and 4) an integrated distributed content discovery capability.

Informacije o knjizi

Puni naziv Journal of Cyber Security and Mobility 4-1
Jezik Engleski
Uvez Knjiga - Meki uvez
Datum izdanja 2015
Broj stranica 96
EAN 9788793237667
ISBN 9788793237667
Libristo kod 09879709
Nakladnici River Publishers
Težina 145
Dimenzije 156 x 234 x 5
Poklonite ovu knjigu još danas
To je jednostavno
1 Dodajte knjigu u košaricu i odaberite isporuku kao poklon 2 Zauzvrat ćemo vam poslati kupon 3 Knjiga dolazi na adresu poklonoprimca

Prijava

Prijavite se na svoj račun. Još nemate Libristo račun? Otvorite ga odmah!

 
obvezno
obvezno

Nemate račun? Ostvarite pogodnosti uz Libristo račun!

Sve ćete imati pod kontrolom uz Libristo račun.

Otvoriti Libristo račun