MARC details
000 -LEADER |
fixed length control field |
02263nam a22003017a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240727152933.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240724b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367432881 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
IIITD |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.67 |
Item number |
SAR-S |
245 00 - TITLE STATEMENT |
Title |
Securing IoT and big data : |
Remainder of title |
next generation intelligence |
Statement of responsibility, etc |
edited by Vijayalakshmi Saravanan ... [et. al] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Boca Raton : |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
©2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 170 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm |
500 ## - GENERAL NOTE |
General note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
1. Basic Foundation of IoT and Big Data. |
-- |
2. Security Model and Architecture for Big Data and IoT. |
-- |
3. Security Technologies for Collecting, Sharing and Analysis of Big Data. |
-- |
4. Intrusion Detection and Transmission Surveillance of IoT and Big Data. |
-- |
5. Big Data and IoT Forensics. |
-- |
6. Storage, System Security and Access Control for Big Data IoT |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet of things. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Big data. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet of things |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Big data |
General subdivision |
Security measures.. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Saravanan, Vijayalakshmi |
Relator term |
editor |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Anpalagan, Alagan |
Relator term |
editor |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Poongodi, T. |
Relator term |
editor |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Khan, Firoz |
Relator term |
editor |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Online version: |
Title |
Securing IoT and big data : next generation intelligence |
Place, publisher, and date of publication |
Boca Raton : CRC Press, 2021. |
International Standard Book Number |
9781003009092 |
Record control number |
(DLC) 2020028014 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |