Wellcome

RIoT control : (Record no. 504168)

MARC details
000 -LEADER
fixed length control field 03631cam a2200649Ii 4500
001 -
control field ocn958936667
003 -
control field OCoLC
005 -
control field 20190719103329.0
006 -
fixed length control field m o d
007 -
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160922s2017 mau o 001 0 eng d
040 ## -
-- N$T
-- eng
-- rda
-- pn
-- N$T
-- N$T
-- OPELS
-- OCLCO
-- IDEBK
-- OCLCO
-- TEFOD
-- OCLCO
-- YDX
-- OCLCO
-- QCL
-- UPM
-- S4S
-- OCLCQ
-- U3W
-- D6H
-- OCLCF
-- BRX
019 ## -
-- 960895214
-- 965413088
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124199903
Qualifying information (electronic bk.)
International Standard Book Number 0124199909
Qualifying information (electronic bk.)
-- 9780124199712
035 ## -
-- (OCoLC)958936667
-- (OCoLC)960895214
-- (OCoLC)965413088
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
-- QA76.5915
072 #7 -
-- COM
-- 013000
-- bisacsh
-- COM
-- 014000
-- bisacsh
-- COM
-- 018000
-- bisacsh
-- COM
-- 067000
-- bisacsh
-- COM
-- 032000
-- bisacsh
-- COM
-- 037000
-- bisacsh
-- COM
-- 052000
-- bisacsh
-- COM
-- 053000
-- bisacsh
082 04 -
Classification number 004.67/8
-- 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Macaulay, Tyson,
245 10 - TITLE STATEMENT
Title RIoT control :
Remainder of title understanding and managing risks and the internet of things /
Statement of responsibility, etc Tyson Macaulay.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
500 ## - GENERAL NOTE
General note Includes index.
650 #0 -
Topical term or geographic name as entry element Internet of things
Topical term or geographic name as entry element Ubiquitous computing.
Topical term or geographic name as entry element Embedded Internet devices.
Topical term or geographic name as entry element Internet
Topical term or geographic name as entry element COMPUTERS / Computer Literacy
Topical term or geographic name as entry element COMPUTERS / Computer Science
Topical term or geographic name as entry element COMPUTERS / Data Processing
Topical term or geographic name as entry element COMPUTERS / Hardware / General
Topical term or geographic name as entry element COMPUTERS / Information Technology
Topical term or geographic name as entry element COMPUTERS / Machine Theory
Topical term or geographic name as entry element COMPUTERS / Reference
Topical term or geographic name as entry element COMPUTERS / Security / General
Topical term or geographic name as entry element Embedded Internet devices.
Topical term or geographic name as entry element Internet
Topical term or geographic name as entry element Ubiquitous computing.
856 40 -
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780124199712
100 1# - MAIN ENTRY--PERSONAL NAME
-- author.
264 #1 -
-- Cambridge, MA :
-- Morgan Kaufmann,
-- [2017]
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Vendor-supplied metadata.
520 ## -
-- RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
504 ## -
-- Includes bibliographical references and index.
650 #0 -
-- Management.
-- Security measures.
-- bisacsh
-- bisacsh
-- bisacsh
-- bisacsh
-- bisacsh
-- bisacsh
-- bisacsh
-- bisacsh
-- fast
-- (OCoLC)fst01742162
-- Security measures.
-- fast
-- (OCoLC)fst01751426
-- fast
-- (OCoLC)fst01160283
655 #4 -
-- Electronic books.
-- Electronic books.
-- local
856 40 -
-- ScienceDirect
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Total Checkouts Barcode Date last seen Koha item type
      Mysore University Main Library Mysore University Main Library 19/07/2019   EBKELV469 19/07/2019 Ebooks

No. of hits (from 9th Mar 12) :

Powered by Koha