This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers’ goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give anactual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
Epub (Kobo), Epub (Adobe)
Publication Date: 10/05/2021
- ISBN:
- 9789813349964
- 9789813349964
- Category:
- Engineering: general
- Format:
- Epub (Kobo), Epub (Adobe)
- Publication Date:
- 10-05-2021
- Language:
- English
- Publisher:
- Springer Nature Singapore
This item is delivered digitally
Great!
Click on Save to My Library / Lists
Click on Save to My Library / Lists
Select the List you'd like to categorise as, or add your own
Here you can mark if you have read this book, reading it or want to read
Awesome! You added your first item into your Library
Great! The fun begins.
Click on My Library / My Lists and I will take you there
Click on My Library / My Lists and I will take you there
You can find this item in:
Network security
Computer security
Artificial intelligence
Privacy & data protection
Engineering: general
Show more
Show less
Reviews
Be the first to review Security Issues and Privacy Threats in Smart Ubiquitous Computing.
Share This eBook: