Challenges in the IoT and Smart Environments Challenges in the IoT and Smart Environments
Advanced Sciences and Technologies for Security Applications

Challenges in the IoT and Smart Environments

A Practitioners' Guide to Security, Ethics and Criminal Threats

Reza Montasari and Others
    • $139.99
    • $139.99

Publisher Description

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics.

Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.

GENRE
Computers & Internet
RELEASED
2021
November 26
LANGUAGE
EN
English
LENGTH
326
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
35.6
MB
Open Research Problems in Network Security Open Research Problems in Network Security
2011
Cyber Security and Privacy Cyber Security and Privacy
2014
Security and Privacy in Cyber-Physical Systems Security and Privacy in Cyber-Physical Systems
2017
The InfoSec Handbook The InfoSec Handbook
2014
ISSE 2013 Securing Electronic Business Processes ISSE 2013 Securing Electronic Business Processes
2013
Computer and Information Security Handbook Computer and Information Security Handbook
2009
Digital Transformation in Policing: The Promise, Perils and Solutions Digital Transformation in Policing: The Promise, Perils and Solutions
2023
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution
2024
Applications for Artificial Intelligence and Digital Forensics in National Security Applications for Artificial Intelligence and Digital Forensics in National Security
2023
Social Media Analytics, Strategies and Governance Social Media Analytics, Strategies and Governance
2022
Countering Cyberterrorism Countering Cyberterrorism
2023
Artificial Intelligence and National Security Artificial Intelligence and National Security
2022
Counter-Terrorism, Ethics and Technology Counter-Terrorism, Ethics and Technology
2021
Open Source Intelligence Investigation Open Source Intelligence Investigation
2017
Cyber Weaponry Cyber Weaponry
2018
Digital Transformation in Policing: The Promise, Perils and Solutions Digital Transformation in Policing: The Promise, Perils and Solutions
2023
Cyber Criminology Cyber Criminology
2018
Security by Design Security by Design
2018