このページのリンク

Internet of Things from Hype to Reality : The Road to Digitization / by Ammar Rayes, Samer Salam

データ種別 電子ブック
3rd ed. 2022.
出版者 (Cham : Springer International Publishing : Imprint: Springer)
出版年 2022
大きさ XXX, 451 p. 179 illus., 175 illus. in color : online resource
著者標目 *Rayes, Ammar author
Salam, Samer author
SpringerLink (Online service)

所蔵情報を非表示

URL
射水-電子 007 EB0002437 Computer Scinece R0 2005-6,2022-3

9783030901585

書誌詳細を非表示

一般注記 Introduction -- Part I: IoT Overview and Architecture -- IoT Timeline -- IoT Reference Model -- Evolution of IoT Protocol Stack -- State of the Industry -- Part II: Fog Computing -- Why Fog -- Defining the Fog -- Data In Motion -- Part III: IoT Management and Applications -- IoT Management -- IoT Security -- IoT Traffic Engineering -- IoT Applications -- Part IV: IoT-Based Smart Services -- Smart Service Framework -- Creating Smart Services -- Service Creation, development and delivery -- Ecosystems Partners -- Services reference architecture -- Part V: IoT Standards -- OneM2M -- ATSI -- ETSI -- IEEE -- Part VI: Invited Chapters -- IoT Business Models -- Open Source Initiatives -- Data in Motion. The Blockchain in IoT -- Conclusion
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. As with the second edition, it is organized into six main parts: an IoT reference model; fog computing and the drivers; IoT management and applications; smart services in IoT; IoT standards; and case studies. This edition’s features include overhaul of the IoT Protocols (Chapter 5) to include an expanded treatment of low-power wide area networks including narrow band IoT (NB-IoT) protocol, updated IoT platforms and capabilities (Chapter 7) to include comparison of commercially available platforms (e.g. AWS IoT Platform, Google Cloud IoT Platform, Microsoft Azure IoT Platform, and PTC ThinkWorx), updated security (Chapter 8) to include approaches for securing IoT devices with examples of IoT devices used in security attacks and associated solutions including MUD and DICE, and finally new Appendix B to include six IoT project detailed for students
HTTP:URL=https://doi.org/10.1007/978-3-030-90158-5
件 名 LCSH:Cooperating objects (Computer systems)
LCSH:Telecommunication
LCSH:Application software
FREE:Cyber-Physical Systems
FREE:Communications Engineering, Networks
FREE:Computer and Information Systems Applications
分 類 LCC:TK7895.E42
LCC:TK5105.8857
DC23:621.38
書誌ID EB00001825
ISBN 9783030901585

 類似資料