MARC details
000 -LEADER |
fixed length control field |
03631cam a2200649Ii 4500 |
001 - |
control field |
ocn958936667 |
003 - |
control field |
OCoLC |
005 - |
control field |
20190719103329.0 |
006 - |
fixed length control field |
m o d |
007 - |
fixed length control field |
cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160922s2017 mau o 001 0 eng d |
040 ## - |
-- |
N$T |
-- |
eng |
-- |
rda |
-- |
pn |
-- |
N$T |
-- |
N$T |
-- |
OPELS |
-- |
OCLCO |
-- |
IDEBK |
-- |
OCLCO |
-- |
TEFOD |
-- |
OCLCO |
-- |
YDX |
-- |
OCLCO |
-- |
QCL |
-- |
UPM |
-- |
S4S |
-- |
OCLCQ |
-- |
U3W |
-- |
D6H |
-- |
OCLCF |
-- |
BRX |
019 ## - |
-- |
960895214 |
-- |
965413088 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780124199903 |
Qualifying information |
(electronic bk.) |
|
International Standard Book Number |
0124199909 |
Qualifying information |
(electronic bk.) |
|
-- |
9780124199712 |
035 ## - |
-- |
(OCoLC)958936667 |
-- |
(OCoLC)960895214 |
-- |
(OCoLC)965413088 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
-- |
QA76.5915 |
072 #7 - |
-- |
COM |
-- |
013000 |
-- |
bisacsh |
|
-- |
COM |
-- |
014000 |
-- |
bisacsh |
|
-- |
COM |
-- |
018000 |
-- |
bisacsh |
|
-- |
COM |
-- |
067000 |
-- |
bisacsh |
|
-- |
COM |
-- |
032000 |
-- |
bisacsh |
|
-- |
COM |
-- |
037000 |
-- |
bisacsh |
|
-- |
COM |
-- |
052000 |
-- |
bisacsh |
|
-- |
COM |
-- |
053000 |
-- |
bisacsh |
082 04 - |
Classification number |
004.67/8 |
-- |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Macaulay, Tyson, |
245 10 - TITLE STATEMENT |
Title |
RIoT control : |
Remainder of title |
understanding and managing risks and the internet of things / |
Statement of responsibility, etc |
Tyson Macaulay. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
650 #0 - |
Topical term or geographic name as entry element |
Internet of things |
|
Topical term or geographic name as entry element |
Ubiquitous computing. |
|
Topical term or geographic name as entry element |
Embedded Internet devices. |
|
Topical term or geographic name as entry element |
Internet |
|
Topical term or geographic name as entry element |
COMPUTERS / Computer Literacy |
|
Topical term or geographic name as entry element |
COMPUTERS / Computer Science |
|
Topical term or geographic name as entry element |
COMPUTERS / Data Processing |
|
Topical term or geographic name as entry element |
COMPUTERS / Hardware / General |
|
Topical term or geographic name as entry element |
COMPUTERS / Information Technology |
|
Topical term or geographic name as entry element |
COMPUTERS / Machine Theory |
|
Topical term or geographic name as entry element |
COMPUTERS / Reference |
|
Topical term or geographic name as entry element |
COMPUTERS / Security / General |
|
Topical term or geographic name as entry element |
Embedded Internet devices. |
|
Topical term or geographic name as entry element |
Internet |
|
Topical term or geographic name as entry element |
Ubiquitous computing. |
856 40 - |
Uniform Resource Identifier |
http://www.sciencedirect.com/science/book/9780124199712 |
100 1# - MAIN ENTRY--PERSONAL NAME |
-- |
author. |
264 #1 - |
-- |
Cambridge, MA : |
-- |
Morgan Kaufmann, |
-- |
[2017] |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
588 0# - |
-- |
Vendor-supplied metadata. |
520 ## - |
-- |
RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases. |
504 ## - |
-- |
Includes bibliographical references and index. |
650 #0 - |
-- |
Management. |
|
-- |
Security measures. |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
bisacsh |
|
-- |
fast |
-- |
(OCoLC)fst01742162 |
|
-- |
Security measures. |
-- |
fast |
-- |
(OCoLC)fst01751426 |
|
-- |
fast |
-- |
(OCoLC)fst01160283 |
655 #4 - |
-- |
Electronic books. |
|
-- |
Electronic books. |
-- |
local |
856 40 - |
-- |
ScienceDirect |