Challenges in the IoT and Smart Environments Challenges in the IoT and Smart Environments
Advanced Sciences and Technologies for Security Applications

Challenges in the IoT and Smart Environments

A Practitioners' Guide to Security, Ethics and Criminal Threats

Reza Montasari and Others
    • £114.99
    • £114.99

Publisher Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics.

Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.

GENRE
Computing & Internet
RELEASED
2021
26 November
LANGUAGE
EN
English
LENGTH
326
Pages
PUBLISHER
Springer International Publishing
SIZE
35.6
MB
Open Research Problems in Network Security Open Research Problems in Network Security
2011
Cyber Security and Privacy Cyber Security and Privacy
2014
Security and Privacy in Cyber-Physical Systems Security and Privacy in Cyber-Physical Systems
2017
The InfoSec Handbook The InfoSec Handbook
2014
ISSE 2013 Securing Electronic Business Processes ISSE 2013 Securing Electronic Business Processes
2013
Computer and Information Security Handbook Computer and Information Security Handbook
2009
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution
2024
Applications for Artificial Intelligence and Digital Forensics in National Security Applications for Artificial Intelligence and Digital Forensics in National Security
2023
Social Media Analytics, Strategies and Governance Social Media Analytics, Strategies and Governance
2022
Digital Transformation in Policing: The Promise, Perils and Solutions Digital Transformation in Policing: The Promise, Perils and Solutions
2023
Countering Cyberterrorism Countering Cyberterrorism
2023
Artificial Intelligence and National Security Artificial Intelligence and National Security
2022
Counter-Terrorism, Ethics and Technology Counter-Terrorism, Ethics and Technology
2021
Combatting Cybercrime and Cyberterrorism Combatting Cybercrime and Cyberterrorism
2016
Machine Learning for Cyber Agents Machine Learning for Cyber Agents
2022
Information Sharing in Military Operations Information Sharing in Military Operations
2016
Disaster Forensics Disaster Forensics
2016
Analytical Methods for Nonproliferation Analytical Methods for Nonproliferation
2016