ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Privacy Vulnerabilities and Data Security Challenges in the IoT

دانلود کتاب آسیب‌پذیری‌های حریم خصوصی و چالش‌های امنیت داده در اینترنت اشیا

Privacy Vulnerabilities and Data Security Challenges in the IoT

مشخصات کتاب

Privacy Vulnerabilities and Data Security Challenges in the IoT

ویرایش:  
نویسندگان: , ,   
سری: Internet of Everything (IoE): Security and Privacy Paradigm 
ISBN (شابک) : 2020020017, 9780429322969 
ناشر: CRC Press 
سال نشر: 2020 
تعداد صفحات: 235 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 17 مگابایت 

قیمت کتاب (تومان) : 32,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Privacy Vulnerabilities and Data Security Challenges in the IoT به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب آسیب‌پذیری‌های حریم خصوصی و چالش‌های امنیت داده در اینترنت اشیا نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب آسیب‌پذیری‌های حریم خصوصی و چالش‌های امنیت داده در اینترنت اشیا

این کتاب تکامل مسائل امنیتی و حریم خصوصی در اینترنت اشیا (IoT) را مورد بحث قرار می دهد. تمرکز این کتاب بر گردآوری تمام فناوری‌های مرتبط با امنیت و حریم خصوصی در یک منبع واحد است تا دانش‌آموزان، محققان، دانشگاهیان و کسانی که در صنعت هستند بتوانند به راحتی مسائل امنیتی و حریم خصوصی اینترنت اشیا را درک کنند. این کتاب ویرایش شده استفاده از مهندسی امنیت و اصول حفظ حریم خصوصی به طراحی را برای طراحی یک اکوسیستم ایمن اینترنت اشیا و پیاده سازی راه حل های امنیت سایبری مورد بحث قرار می دهد. این کتاب خوانندگان را به سفری می برد که با درک مسائل امنیتی در فناوری های مجهز به اینترنت اشیاء و نحوه استفاده از آنها در بخش های مختلف آغاز می شود. خوانندگان را درگیر چالش های امنیتی و ایجاد زیرساخت ایمن برای دستگاه های اینترنت اشیا می کند. این کتاب به محققان و متخصصان کمک می‌کند تا معماری امنیتی اینترنت اشیا و پیشرفته‌ترین اقدامات مقابله با اینترنت اشیا را درک کنند. همچنین تهدیدات امنیتی در زیرساخت‌های مجهز به اینترنت اشیا را از شبکه‌های موقت یا زیرساختی سنتی متمایز می‌کند و بحثی جامع در مورد چالش‌ها و راه‌حل‌های امنیتی در RFID و WSN در اینترنت اشیا ارائه می‌دهد. هدف این کتاب برجسته کردن مفاهیم فناوری‌های مرتبط و یافته‌های جدید توسط محققان از طریق سازماندهی فصل است. مخاطبان اصلی شامل متخصصان، محققان، دانشجویان فارغ التحصیل، طراحان، کارشناسان و مهندسانی هستند که در مورد مسائل مربوط به امنیت تحقیق می کنند.


توضیحاتی درمورد کتاب به خارجی

This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT. This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Editors
Contributors
Chapter 1 Applications of Industrial Internet of Things (IIoT)
	1.1 Introduction
		1.1.1 Internet of Things
		1.1.2 Machine-To-Machine (M2M)
		1.1.3 Emergence and Growth of IoT
		1.1.4 Setting up an IoT Infrastructure
	1.2 Cloud System Selection
	1.3 Platform Selection
	1.4 IoT Applications in the Industry
		1.4.1 Vehicle Telematics
		1.4.2 Fleet
		1.4.3 Connected Car
		1.4.4 Leasing/Ride Sharing/Asset Management
		1.4.5 Healthcare
		1.4.6 IoT for Patients
		1.4.7 Medical Adherence
		1.4.8 IoT for Physicians
		1.4.9 Blood Banks
		1.4.10 Device Monitoring: Defibrillators/Heart Monitors/Pacemakers
		1.4.11 IoT for Hospitals
		1.4.12 IoT for Health Insurance Companies
		1.4.13 Smart Metering
		1.4.14 Smart House
		1.4.15 Smart City
		1.4.16 Renewable Solar Energy
		1.4.17 Insurance
		1.4.18 Enterprise Use Cases
		1.4.19 Using Iot for a Better World
	1.5 Security, Privacy, and the Internet of Things
		1.5.1 Multiple Network
		1.5.2 Multiple Types of Services
		1.5.3 Scaling Growth
		1.5.4 Automated Functionality
		1.5.5 Long Lifecycles
		1.5.6 Remote Updates
	1.6 The Future of the Internet of Things
		1.6.1 IoT Will Be Primary
		1.6.2 Homes Will Get Smarter
		1.6.3 Enterprises Will Start Using More IoT
	Bibliography
Chapter 2 Biomedical Applications Using IoT
	2.1 Introduction
		2.1.1 According to Wikipedia
		2.1.2 According to Techopedia
		2.1.3 According to Trendmicro.com
		2.1.4 According to Webopedia
	2.2 History of IoT
	2.3 How Does IoT Work?
	2.4 Advantages of IoT
		2.4.1 Communication
		2.4.2 Information
		2.4.3 Automation with Control
		2.4.4 Monitoring
		2.4.5 Time
		2.4.6 Money
		2.4.7 Efficient and Time-Saving
		2.4.8 Improved Lifestyle
	2.5 Disadvantages of IoT
		2.5.1 Compatibility
		2.5.2 Complexity
		2.5.3 Privacy/Security
		2.5.4 Safety
		2.5.5 Staff Downsizing and Unemployment
	2.6 How Big Is IoT?
		2.6.1 Did You Know?
	2.7 IoT Applications
		2.7.1 Smarter Homes
		2.7.2 Wearables
		2.7.3 Smart City
		2.7.4 Smart Electricity Grids
		2.7.5 Industrial Internet
		2.7.6 Connected Cars
		2.7.7 Connected Healthcare
		2.7.8 Smart Retail
		2.7.9 Smart Supply Chains
		2.7.10 Smart Farming
	2.8 IoT in the Biomedical or Healthcare Sectors
	2.9 Why Healthcare?
	2.10 Applications of IoT in Healthcare
		2.10.1 Remote Healthcare/Patient Monitoring
		2.10.2 Wearables
		2.10.3 Patient-Specific Medicines
		2.10.4 Equipment Availability and Maintenance
		2.10.5 Medical Asset Monitoring and Better Patient Care
		2.10.6 Data Management
		2.10.7 Smart Beds
		2.10.8 Diabetes Management
		2.10.9 Help for the Paralyzed
		2.10.10 Senior Monitoring
	2.11 Biomedical Devices and Apps in IoT
		2.11.1 Myo
		2.11.2 Zio
		2.11.3 MyDario
		2.11.4 SleepBot
		2.11.5 GOJO
		2.11.6 Weka
		2.11.7 Apple App to Manage Depression with Smart Watch
		2.11.8 Health Application by Intel
		2.11.9 YuGo
		2.11.10 Sensimed
		2.11.11 MoMeKardia
		2.11.12 Quell
		2.11.13 SmartPump
		2.11.14 Withings Thermo
		2.11.15 Trak
	2.12 Benefits of IoT in Healthcare
		2.12.1 Economic Benefits
		2.12.2 Reduced Risk of Errors
		2.12.3 Solution to Problem of Distance
		2.12.4 Better Treatment Outcomes
		2.12.5 Better Disease Control
		2.12.6 More Trust Towards Doctors
		2.12.7 Easy Control of Medicines
		2.12.8 Maintenance of Connected Devices
	2.13 Drawbacks of IoT in Healthcare
		2.13.1 Privacy Issues for Patients
		2.13.2 Accidental Failures
		2.13.3 Malware
		2.13.4 Lack of Encryption
	2.14 Conclusion
	References
Chapter 3 Emerging Technological Advances in Healthcare
	3.1 Introduction
	3.2 Vision and Engineering of IoT
	3.3 Current Patterns and Uses of IoT in Medical Services
		3.3.1 Persistent Monitoring and Healthcare Delivery: The First Step of IoT Healthcare Ladder
		3.3.2 What Therapeutic Gadgets Can Be Associated Utilizing the Social Insurance IoT Arrangement?
	3.4 Case Study for IoT in Healthcare
	3.5 Difficulties Faced by IoT in Human Services or Healthcare
		3.5.1 How Practical Is It to Actualize IoT Medical Services Arrangements?
	3.6 The Future of IoT in Human Healthcare
	3.7 Conclusion
	References
Chapter 4 The Internet of Things (IoT) and Contactless Payments: An Empirical Analysis of the Healthcare Industry
	4.1 What Are IoT Payments?
		4.1.1 Advantages of IoT in Healthcare
		4.1.2 Advantages of Digital Payment for Healthcare Services
	4.2 Literature Review
		4.2.1 Technology Acceptance Model (TAM)
			4.2.1.1 Perceived Convenience
			4.2.1.2 Perceived Ease of Use
			4.2.1.3 Conceptual Framework and Propositions
	4.3 Proposed System
		4.3.1 Proposed Architecture
		4.3.2 Patient Position Device
			4.3.2.1 Sensors to Measure Body Temperature
			4.3.2.2 Sensors to Measure Heart Rate
		4.3.3 Recommended Design
			4.3.3.1 Implementation
			4.3.3.2 Importance in the Healthcare Sector
			4.3.3.3 Instamed and Its Digital Pockets Offering
			4.3.3.4 Med Rec and Its Offering
			4.3.3.5 Process Changes
		4.3.4 Methodology
			4.3.4.1 Research Design
			4.3.4.2 Questionnaire Design
		4.3.5 Hypothesis
		4.3.6 Data Analysis and Design
	4.4 Results
	4.5 Discussion and Conclusion
	4.6 Limitations
	4.7 Conclusion
	4.8 Findings
	Bibliography
Chapter 5 AI in Healthcare
	5.1 Global Research Update on AI in Healthcare
	5.2 Scope of AI in Healthcare
	5.3 Data Analytics (Machine Learning, Deep Learning Algorithms)
	5.4 Medical Imaging (MRI, CT, Ultrasound, and Other Imaging Techniques)
	5.5 Cancer Detection, Disease Management, and Drug Discovery
		5.5.1 AI in Oncology
		5.5.2 Detection Using AI
		5.5.3 Disease Characterization Using AI
		5.5.4 Monitoring of Disease Using AI
	5.6 Challenges for AI in Healthcare
	5.7 Future Prospects
	5.8 Healthcare in 2019 and Beyond: Five AI Trends to Watch
		5.8.1 The Internet of Medical Things (IoMT)
		5.8.2 Telemedicine
		5.8.3 Wearables in Healthcare
		5.8.4 Chatbots
		5.8.5 Cloud Computing
	5.9 AI in Healthcare: An Innovation and Opportunity in Disguise
	5.10 The Story beyond 2019
		5.10.1 AI-Powered Chips
		5.10.2 IoT and AI
		5.10.3 Automated Machine Learning
		5.10.4 The Rise of Facial Recognition
		5.10.5 Increased Automation
	5.11 Limitations
	5.12 Conclusions
	References
Chapter 6 Security Vulnerabilities in the IoT
	6.1 Introduction to IoT
	6.2 Background
	6.3 Advantages of IoT
	6.4 Disadvantages of IoT
	6.5 Reasons for IoT Devices’ Vulnerabilities
	6.6 What Are IoT Devices and Services?
		6.6.1 IoT Devices
		6.6.2 Services of IoT
		6.6.3 IoT Devices and Services: Security
	6.7 Security and Safety Threats, Attacks, and Vulnerabilities
		6.7.1 Vulnerability
		6.7.2 Exposure
		6.7.3 Threats
		6.7.4 Attacks
	6.8 Primary Security and Privacy Goals
		6.8.1 Confidentiality
		6.8.2 Integrity
		6.8.3 Authentication and Authorization
		6.8.4 Availability
		6.8.5 Accountability
		6.8.6 Auditing
		6.8.7 Non-Repudiation
		6.8.8 Privacy Goals
	6.9 Intruders, Motivations, and Capabilities
		6.9.1 Tools and Techniques Used by Intruders
		6.9.2 Purpose and Motivation of Attack
		6.9.3 Classification of Possible Intruders
			6.9.3.1 Individuals
			6.9.3.2 Organized Groups
			6.9.3.3 Intelligence Agency
	6.10 Discussion and Conclusions
		6.10.1 Discussion
		6.10.2 Conclusions
	References
Chapter 7 Research on IoT Governance, Security, and Privacy Issues of Internet of Things
	7.1 Introduction
		7.1.1 Birth of IoT
		7.1.2 Introduction to IoT
		7.1.3 Edges of IoT
		7.1.4 IoT Hardware
	7.2 IoT across Numerous Domains
	7.3 IoT Security Challenges
		7.3.1 Famous IoT Security Breaches and IoT Hacks
		7.3.2 IoT Security Apparatuses and Enactment
	7.4 What Enterprises Are Most Helpless against IoT Security Dangers?
		7.4.1 Step-by-Step Directions to Secure IoT Frameworks and Gadgets
	7.5 Common IoT Safety Efforts
	7.6 Difficulties for Privacy and Security in IoT
		7.6.1 Security and Protection
	7.7 Conclusion
	Bibliography
Chapter 8 Recent Trends of IoT and Big Data in Research Problem-Solving
	8.1 IoT Big Data Exploration, Storage, Processing, and Analytics
		8.1.1 Data Exploration
		8.1.2 Data Processing
			8.1.2.1 Batch-Based Processing Technologies
			8.1.2.2 Technologies Based on Stream Processing
			8.1.2.3 Interactive Analysis
		8.1.3 IoT Big Data Analytics Methods
			8.1.3.1 Classification
			8.1.3.2 Clustering
			8.1.3.3 Association Rule
	8.2 IoT Security
		8.2.1 Authentication Technologies in IoT
		8.2.2 Encryption and Key Management
		8.2.3 Protocols
		8.2.4 Challenges and Potential Future Trends in IoT Security
			8.2.4.1 Object Identification
			8.2.4.2 Authentication and Authorization
			8.2.4.3 Privacy
			8.2.4.4 Software Vulnerability Analysis
			8.2.4.5 Malware in IoT
	8.3 The Internet of Things and Social Networks
		8.3.1 Basic Understanding of the Social Internet of Things (SIoT)
		8.3.2 SIoT Research Trends
			8.3.2.1 SIoT Paradigm
			8.3.2.2 SIoT Architecture
			8.3.2.3 SIoT Applications and Trends
	8.4 Smart Cities and Applications
		8.4.1 IoT Technologies for Smart Cities
			8.4.1.1 Radio-Frequency Identification (RFID)
			8.4.1.2 Wireless Sensor Networks (WSN)
			8.4.1.3 Addressing
			8.4.1.4 Middleware
		8.4.2 IoT Actual Trends for Smart Cities
			8.4.2.1 Smart Homes
			8.4.2.2 Smart Parking Lots
			8.4.2.3 Vehicular Traffic
			8.4.2.4 Environmental Pollution
			8.4.2.5 Surveillance Systems
			8.4.2.6 Smart Energy and Smart Grids
	References
Chapter 9 A Theoretical Context for CSF in Medical Software Next Release
	9.1 Introduction
	9.2 Background
		9.2.1 Software NRP
		9.2.2 Critical Success Factor Approach
	9.3 Success Factors for NRP-Based Software Projects
	9.4 Research Methodology
	9.5 Data Analysis and Results
		9.5.1 Exploratory Factor Analysis
			9.5.1.1 Multiple Regression Model
		9.5.2 Discussion
	9.6 Conclusions
	9.7 Limitations and Future Scope
	Appendix
	References
Chapter 10 Robotics and Machine Learning
	10.1 Introduction: Robotics and Machine Learning Cooperation
	10.2 Machine Learning Approaches in Robotics
		10.2.1 Computer Vision
		10.2.2 Imitation Learning
		10.2.3 Self-Supervised Learning
		10.2.4 Assistive and Medical Technologies
		10.2.5 Multi-Agent Learning
	10.3 Research Trends in Robotics and Machine Learning
		10.3.1 Challenge 1: Complicated Multi-Dimensional Motion
		10.3.2 Challenge 2: Control Policies in Moving Landscape
		10.3.3 Challenge 3: Advanced Manipulation
		10.3.4 Challenge 4: Advanced Object Recognition
		10.3.5 Challenge 5: Assessment and Forecasting of Human Motion
		10.3.6 Challenge 6: Fusion of Sensors and Reduction in Dimensions
		10.3.7 Challenge 7: High-Rated Task Planning
	10.4 Robotics, an Emerging Field
		10.4.1 Six Main Trends and Their Implications
			10.4.1.1 Commercial Investments
			10.4.1.2 Emergence of New International Players
			10.4.1.3 Reduction in Hardware Costs
			10.4.1.4 Popularity of Drones in the Civilian Sector
			10.4.1.5 Cloud Robotics
			10.4.1.6 Leveraging Social Media Data
	10.5 Machine Learning Algorithms
		10.5.1 Types of Machine Learning Algorithms
			10.5.1.1 Supervised Learning Algorithms
			10.5.1.2 Unsupervised Learning Algorithms
			10.5.1.3 Reinforcement Learning
	10.6 Data Science Helping Robotics
		10.6.1 Data Science and Robotics
	10.7 Impact of Machine Learning on Robotic Technologies
		10.7.1 Machine Learning and Its Applications in Robotics
			10.7.1.1 Computer Vision
			10.7.1.2 Imitation Learning
			10.7.1.3 Assistive and Medical Technologies
	10.8 Learning Involving the Multi-Agent
		10.8.1 Challenges
	10.9 Conclusion
	Bibliography
Chapter 11 Detecting Medical Reviews Using Sentiment Analysis
	11.1 Introduction
	11.2 Background
	11.3 Data Transformation
	11.4 Filtering
	11.5 Lexicon-Based Method of Sentiment Analysis: Lexicon Construction
	11.6 Classification
	11.7 Evaluation
	11.8 A Review of Sentiment Analysis
	11.9 Performing Sentiment Analysis on Medical Reviews
	11.10 Sentiment Analysis Working Program
	11.11 Conclusion
	Bibliography
Index




نظرات کاربران