Security designs for the cloud, IoT, and social networking / (Record no. 76189)

000 -LEADER
fixed length control field 16914cam a2200505 i 4500
001 - CONTROL NUMBER
control field 21207544
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230221113848.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m |o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190912s2019 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019040595
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119593188
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119593171
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119593201
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119592266
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng.
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.585
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.67/82
Edition number 23
245 00 - TITLE STATEMENT
Title Security designs for the cloud, IoT, and social networking /
Statement of responsibility, etc edited by Dac- Nhuong Le, Chintan Bhatt, Mani Madhukar.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc John Wiley & Sons, Inc. ;
Place of publication, distribution, etc Salem, Massachusetts :
Name of publisher, distributor, etc Scrivener Publishing LLC,
Date of publication, distribution, etc [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note ABOUT THE AUTHOR<br/>Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books.<br/><br/>Chintan Bhatt is an Assistant Professor of U & P U Patel Department of Computer Engineering at Charotar University of Science and Technology, India. He completed his PhD in Computer Science in 2019 and his research interests include data mining, software engineering, networking, big data, Internet of Things (IoT), mobile computing.<br/><br/>Mani Madhukar has 15+ years of experience in computer science with exposure to both IT industry and academia and his current position is as Program Manager-University Relations at IBM India Pvt. Ltd. His education background includes a doctorate in Computer Engineering and Executive program in Management from McIntire School of Commerce, University of Virginia, USA. He has worked in various roles across different technologies including blockchain, cloud, data science, IBM Watson and Internet of Things. He represents IBM in various national and international forums as technical expert /panelist on various technologies.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 2# - CONTENTS
Formatted contents note TABLE OF CONTENTS<br/>List of Figures xv<br/><br/>List of Tables xix<br/><br/>Foreword xxi<br/><br/>Preface xxiii<br/><br/>Acknowledgments xxv<br/><br/>Acronyms xxvii<br/><br/>Part I Security Designs for the Cloud Network<br/><br/>1 Encryption Algorithm for Data Security in Cloud Computing 3<br/>Anindita Desarkar, Ajanta Das<br/><br/>1.1 Introduction 4<br/><br/>1.2 Related Work 4<br/><br/>1.3 Cloud Computing - A Brief Overview 5<br/><br/>1.3.1 Essential Characteristics 5<br/><br/>1.3.2 Layers of Cloud Computing 6<br/><br/>1.3.3 Cloud Deployment Models 7<br/><br/>1.4 Data Security in Cloud Storage 7<br/><br/>1.4.1 Security Issues in Cloud 7<br/><br/>1.4.2 Symmetric Encryption Algori 8<br/><br/>1.4.3 Asymmetric Encryption Algorithms 12<br/><br/>1.4.4 Security Enhancement in Cloud Using Encryption Algorithms: Observations 15<br/><br/>1.5 Comparison of Encryption Algorithms 16<br/><br/>1.6 Performance Analysis of Encryption Algorithms in Cloud 16<br/><br/>1.7 Conclusion 17<br/><br/>References 17<br/><br/>2 Analysis of Security Issues in Cloud Environment 19<br/>Sushruta Mishra, Nitin Tripathy, Brojo Kishore Mishra, Chandrakanta Mahanty<br/><br/>2.1 An Insight into Cloud Computing 20<br/><br/>2.2 Critical Challenges Concerning Cloud Computing 21<br/><br/>2.2.1 Data Protection 21<br/><br/>2.2.2 Data Recovery and Availability 22<br/><br/>2.2.3 Management Capacities 22<br/><br/>2.2.4 Regulatory and Compliance Restrictions 22<br/><br/>2.3 Basic Models Governing Cloud Computing 22<br/><br/>2.3.1 Cloud Computing Models 23<br/><br/>2.3.2 Security Concerns of Cloud Computing 23<br/><br/>2.4 Security Countermeasures in Cloud Computing 26<br/><br/>2.4.1 Countermeasures for Communication Issues 26<br/><br/>2.4.2 Countermeasures for Architecture Security 26<br/><br/>2.4.3 Countermeasures for Challenges Inherited from Network Concepts 27<br/><br/>2.4.4 Countermeasures for CAS Proposed Threats 28<br/><br/>2.5 Discussion of an Implemented SDN Security Framework 29<br/><br/>2.5.1 System Design 29<br/><br/>2.5.2 Phase 1: User Authentication Phase 30<br/><br/>2.5.3 Phase 2: Controller Assignment Phase 31<br/><br/>2.5.4 Phase 3: Communication Phase 33<br/><br/>2.6 Result Analysis 35<br/><br/>2.6.1 Simulation Environment 35<br/><br/>2.6.2 Analysis of Different Attacks 35<br/><br/>2.6.3 Comparative Analysis 36<br/><br/>2.7 Conclusion 40<br/><br/>References 40<br/><br/>3 Security and Challenges in Mobile Cloud Computing 43<br/>Ankur Dumka, Minakshi Memoria, Alaknanda Ashok<br/><br/>3.1 Introduction 44<br/><br/>3.1.1 Mobile Cloud Computing 44<br/><br/>3.1.2 Internet of Things and Cloud Computing 46<br/><br/>3.2 Literature Review 46<br/><br/>3.3 Architecture of Integration of Mobile Cloud Computing with IoT 46<br/><br/>3.3.1 Infrastructural or Architectural Issues 49<br/><br/>3.3.2 Privacy Issues 52<br/><br/>3.3.3 Compliance Issues 53<br/><br/>3.4 Proposed Preventive Measure for Security in MCC 54<br/><br/>3.5 Conclusion 55<br/><br/>References 55<br/><br/>4 Fog Computing and Its Security Issues 59<br/>Jyotir Moy Chatterjee, Ishaani Priyadarshini, Shankeys, and DacNhuong Le<br/><br/>4.1 Introduction 60<br/><br/>4.2 Current Fog Applications 62<br/><br/>4.2.1 Why Do We Need Fog? 62<br/><br/>4.2.2 What Can We Do with Fog? 63<br/><br/>4.3 Security and Privacy in Fog Computing 66<br/><br/>4.3.1 Trust and Authentication 66<br/><br/>4.3.2 Man-in-the-Middle Attacks (MITM) 66<br/><br/>4.3.3 Network Security 68<br/><br/>4.3.4 Secure Data Storage 69<br/><br/>4.4 Secure and Private Data Computation 69<br/><br/>4.4.1 Privacy 70<br/><br/>4.4.2 Access Control 71<br/><br/>4.4.3 Intrusion Detection 71<br/><br/>4.5 Conclusion 71<br/><br/>References 73<br/><br/>5 Application Safety and Service Vulnerability in Cloud Network 77<br/>Sudipta Sahana, Debabrata Sarddar<br/><br/>5.1 Introduction 78<br/><br/>5.1.1 Introduction to Security Issues in Cloud Service Models 78<br/><br/>5.1.2 Security Issues in SaaS 78<br/><br/>5.1.3 Security Issues in PaaS 79<br/><br/>5.1.4 Security Issues in IaaS 79<br/><br/>5.2 Security Concerns of Cloud Computing 80<br/><br/>5.2.1 Data Breaches 80<br/><br/>5.2.2 Hijacking of Accounts 81<br/><br/>5.2.3 Insider Threat 81<br/><br/>5.2.4 Malware Injection 82<br/><br/>5.2.5 Abuse of Cloud Services 82<br/><br/>5.2.6 Insecure APIs 82<br/><br/>5.2.7 Denial of Service Attacks 83<br/><br/>5.2.8 Insufficient Due Diligence 83<br/><br/>5.2.9 Shared Vulnerabilities 84<br/><br/>5.2.10 Data Loss 84<br/><br/>5.3 Security Tools in Cloud 84<br/><br/>5.3.1 Qualys 85<br/><br/>5.3.2 CipherCloud 85<br/><br/>5.3.3 Okta 86<br/><br/>5.3.4 Skyline Networks 86<br/><br/>5.3.5 Bitglass 86<br/><br/>5.3.6 WhiteHat Security 87<br/><br/>5.3.7 Proofpoint 87<br/><br/>5.3.8 docTrackr 87<br/><br/>5.3.9 Centrify 87<br/><br/>5.3.10 Vaultive 88<br/><br/>5.3.11 Zscaler 88<br/><br/>5.3.12 SilverSky 88<br/><br/>5.4 Cloud Service Vulnerabilities 89<br/><br/>5.4.1 Visibility and Control Reduction at the Consumer End 89<br/><br/>5.4.2 On-Demand SelfService Simplifies Unauthorized Use 89<br/><br/>5.4.3 Web-Based Organization APIs Can Be Compromised 90<br/><br/>5.4.4 Separation among Multi-Tenant Fails 90<br/><br/>5.4.5 Incomplete Data Deletion 90<br/><br/>5.4.6 Stolen Credentials 90<br/><br/>5.4.7 Increased Complexity Strains IT Staff 91<br/><br/>5.4.8 Vendor Lock-In Complicates Moving to Other CSPs 91<br/><br/>5.4.9 Insiders Abuse Authorized Access 91<br/><br/>5.4.10 Stored Data is Lost 92<br/><br/>5.4.11 CSP Supply Chain Can Be Compromised 92<br/><br/>5.4.12 Inadequate Due Diligence Amplifies Cyber Threat 92<br/><br/>5.5 Cloud Computing Security Best Practices 92<br/><br/>5.5.1 Cloud Data Encryption 92<br/><br/>5.5.2 Identity and Access Management 93<br/><br/>5.5.3 Network Segmentation 93<br/><br/>5.5.4 Disaster Recovery 93<br/><br/>5.5.5 Vulnerability Management 93<br/><br/>5.5.6 Monitoring, Altering and Reporting 94<br/><br/>5.6 Conclusion 94<br/><br/>References 94<br/><br/>Part II Security Designs for the Internet of Things and Social Networks<br/><br/>6 IoT Security and Privacy Preservation 99<br/>Bright Keswan, Tarini Ch. Mishra, Ambarish G. Mohapatra, Poonam Keswani<br/><br/>6.1 Introduction 100<br/><br/>6.2 Review of Existing Technology 101<br/><br/>6.3 Research Design 101<br/><br/>6.4 Methodology 103<br/><br/>6.4.1 AWS IoT 103<br/><br/>6.4.2 ARM Mbed IoT 104<br/><br/>6.4.3 Azure IoT Suite 106<br/><br/>6.5 Implication and Findings 106<br/><br/>6.5.1 Ethical 106<br/><br/>6.5.2 Legal 107<br/><br/>6.5.3 Social 107<br/><br/>6.6 Future Scope 108<br/><br/>6.7 Conclusion 108<br/><br/>References 109<br/><br/>7 Automation Movie Recommender System Based on Internet of Things and Clustering 113<br/>Lalit Mohan Goyal, Mamta Mittal, Asheesh Sharma<br/><br/>7.1 Introduction 114<br/><br/>7.2 Background 115<br/><br/>7.2.1 Characteristics of IoT 115<br/><br/>7.2.2 Evolution of IoT 115<br/><br/>7.2.3 Trends in IoT 116<br/><br/>7.2.4 Requirements of IoT 116<br/><br/>7.2.5 IoT Elements 116<br/><br/>7.2.6 Architecture of IoT 117<br/><br/>7.2.7 Application Domain of IoT 117<br/><br/>7.2.8 IoT Technology 119<br/><br/>7.2.9 The Present and Future of IoT 121<br/><br/>7.2.10 IoT Challenges 121<br/><br/>7.2.11 Scope of IoT 122<br/><br/>7.3 Related Works 122<br/><br/>7.4 Proposed System 123<br/><br/>7.5 Implementation 124<br/><br/>7.6 Conclusion 127<br/><br/>References 127<br/><br/>8 Societal Implications of Emerging Technologies (SMAC) and Related Privacy Challenges 129<br/>Manikant Roy, Amar Singh, Sukanta Ghosh, Nisha Sethi<br/><br/>8.1 Introduction to Data Analytics 130<br/><br/>8.1.1 Descriptive Analytics 131<br/><br/>8.1.2 Diagnostic Analytics 131<br/><br/>8.1.3 Prescriptive Analytics 131<br/><br/>8.1.4 Exploratory Analytics 132<br/><br/>8.1.5 Predictive Analytics 133<br/><br/>8.1.6 Mechanistic, Causal and Inferential Analytics 133<br/><br/>8.2 Privacy Concerns Related to Use of Data Analytics 133<br/><br/>8.2.1 Immoral Actions Based on Analyses 133<br/><br/>8.2.2 Discrimination 134<br/><br/>8.2.3 Privacy Breaches 134<br/><br/>8.2.4 Inaccuracy of Data Analytics 134<br/><br/>8.2.5 E-Discovery Angst 134<br/><br/>8.2.6 Understanding Cloud Basics 134<br/><br/>8.3 Issues 137<br/><br/>8.3.1 Challenges 137<br/><br/>8.3.2 Services of Cloud 137<br/><br/>8.4 Social Media 138<br/><br/>8.4.1 Introduction 138<br/><br/>8.4.2 Societal Implication of Social Network 139<br/><br/>8.5 Conclusion 139<br/><br/>References 140<br/><br/>9 Implementation of REST Architecure-Based Energy-Efficient Home Automation System 143<br/>Shankey Garg, Jyotir Moy Chatterjee, Dac-Nhuong Le<br/><br/>9.1 Introduction 144<br/><br/>9.2 Related Work 144<br/><br/>9.3 RESTful Web Server 144<br/><br/>9.4 Why and How REST is More Suitable for IoT 145<br/><br/>9.5 Architecture of Arduino-Based Home Automation System 146<br/><br/>9.6 Implementation Details 146<br/><br/>9.7 Why Arduino? 147<br/><br/>9.8 Result Analysis 147<br/><br/>9.8.1 Power Consumption without Automation 148<br/><br/>9.8.2 Power Consumption with IoT 148<br/><br/>9.8.3 Total Power Consumption Analysis 149<br/><br/>9.9 Conclusion and Future Scope 150<br/><br/>References 151<br/><br/>10 The Vital Role of Fog Computing in Internet of Things 153<br/>Vikram Puri, Jolanda G Tromp, Chung Van Le, Nhu Gia Nguyen, Dac-Nhuong Le<br/><br/>10.1 Introduction 154<br/><br/>10.2 Related Studies 155<br/><br/>10.3 IoT Principles and Applications 156<br/><br/>10.4 Different IoT Domains 157<br/><br/>10.4.1 Autonomous Cars 157<br/><br/>10.4.2 Healthcare 157<br/><br/>10.4.3 Smart Home 158<br/><br/>10.4.4 Industry 4.0 158<br/><br/>10.5 Issues in Fog Computing Regarding Security and Privacy 158<br/><br/>10.5.1 Authentication 159<br/><br/>10.5.2 Trust 160<br/><br/>10.5.3 Attacks 160<br/><br/>10.5.4 End User Privacy 160<br/><br/>10.5.5 Secure Communication between Fog Nodes 161<br/><br/>10.6 Conclusion 161<br/><br/>References 161<br/><br/>Part III Security Designs for Solutions and Applications<br/><br/>11 The Role of Information-Centric Security in the Modern Arena of Information Technology 167<br/>Sushree Bibhuprada, Dac-Nhuong Le, B. Priyadarshini<br/><br/>11.1 Introduction 168<br/><br/>11.2 Complete Solution to Data Security 169<br/><br/>11.2.1 Confidentiality 169<br/><br/>11.2.2 Integrity 169<br/><br/>11.2.3 Availability 170<br/><br/>11.3 Intrusion Detection and Security 170<br/><br/>11.3.1 Divergent Type of Intrusion Detection System 170<br/><br/>11.3.2 Potentiality of Intrusion Detection Systems 172<br/><br/>11.3.3 Advantage of Intrusion Detection Systems 173<br/><br/>11.4 IPS vs. IDS 173<br/><br/>11.5 Relevant Methods to Increase Data Safety 174<br/><br/>11.5.1 Limit Data Access 174<br/><br/>11.5.2 Identification of Sensitive Data 174<br/><br/>11.5.3 Pre-Planned Data Security Policy 175<br/><br/>11.5.4 Strong and Different Passwords for Every Department 175<br/><br/>11.5.5 Regular Data Backup and Update 175<br/><br/>11.6 Conclusion 175<br/><br/>References 176<br/><br/>12 Enabling Mobile Technology for Healthcare Service Improvements 179<br/>Bhumi Dobaria, Chintan Bhatt<br/><br/>12.1 Introduction 180<br/><br/>12.1.1 Healthcare System in India 180<br/><br/>12.1.2 What is mHealth? 180<br/><br/>12.1.3 Worldwide mHealth Scenario 181<br/><br/>12.1.4 mHealth and Its Scope in India 181<br/><br/>12.2 System Design 182<br/><br/>12.2.1 Application Server 183<br/><br/>12.2.2 File System 183<br/><br/>12.2.3 Client 183<br/><br/>12.3 Result Analysis 183<br/><br/>12.4 Conclusion 188<br/><br/>References 189<br/><br/>13 Optimization of Ontology-Based Clinical Pathways and Incorporating Differential Privacy in the Healthcare System 191<br/>Soumya Banerjee, Rachid Benlamri, Samia Bouzefrane<br/><br/>13.1 Introduction 192<br/><br/>13.2 Ontological Structure of Clinical Pathways 194<br/><br/>13.3 Proposed Model 195<br/><br/>13.3.1 Elements of Optimization in CP 196<br/><br/>13.3.2 Functional Model of Differential Privacy 196<br/><br/>13.3.3 About the Data Visualization 199<br/><br/>13.3.4 Validation of Results 199<br/><br/>13.4 Conclusion and Further Scope of Research 202<br/><br/>References 203<br/><br/>14 Advancements and Applications in Fog Computing 207<br/>Sumit Bansal, Mayank Aggarwal, Himanshu Aggarwal<br/><br/>14.1 Introduction 208<br/><br/>14.1.1 Cloud Computing 208<br/><br/>14.1.2 Internet of Things 208<br/><br/>14.1.3 Fog Computing 209<br/><br/>14.2 Fog Computing Architecture 210<br/><br/>14.2.1 Features of Fog Computing 210<br/><br/>14.2.2 Architecture of Fog Computing 211<br/><br/>14.2.3 Components of Fog Computing 212<br/><br/>14.3 Communication in Fog Computing 214<br/><br/>14.3.1 Communication Steps 214<br/><br/>14.3.2 Discovery and Detection of ICOs 214<br/><br/>14.3.3 Models of Communication 215<br/><br/>14.3.4 Communication Protocols 215<br/><br/>14.3.5 Communication Protocol Requirements 216<br/><br/>14.3.6 Methods of Data Collection 216<br/><br/>14.4 Application or Programming Models 218<br/><br/>14.4.1 Sense-Process-Actuate Model 218<br/><br/>14.4.2 Stream Processing Model 218<br/><br/>14.4.3 Benefits of Fog over Cloud Computing 219<br/><br/>14.4.4 Simulator Tool 220<br/><br/>14.5 Simulation-Based Experiments 221<br/><br/>14.6 Scheduling 225<br/><br/>14.6.1 Classification of Scheduling 225<br/><br/>14.6.2 Need for Scheduling 225<br/><br/>14.6.3 Existing Scheduling Algorithms 226<br/><br/>14.7 Challenges in Fog Computing 227<br/><br/>14.7.1 Connectivity Challenges 227<br/><br/>14.7.2 Context Awareness 227<br/><br/>14.7.3 Data Handling 228<br/><br/>14.7.4 Security 228<br/><br/>14.7.5 Privacy 229<br/><br/>14.7.6 Pluggable Architecture 229<br/><br/>14.7.7 Sustainability 229<br/><br/>14.7.8 Network and Storage 230<br/><br/>14.8 Use Case Scenarios 230<br/><br/>14.8.1 Smart Home 230<br/><br/>14.8.2 Smart Rail 232<br/><br/>14.8.3 Smart Healthcare 233<br/><br/>14.8.4 Smart Agriculture 234<br/><br/>14.8.5 Future Applications 235<br/><br/>14.9 Emerging Trends 236<br/><br/>14.10 Conclusion 236<br/><br/>References 237<br/><br/>15 Taxonomy of Cyber-Physical Social Systems in Intelligent Transportation 241<br/>Dhiraj, Anil Saini<br/><br/>15.1 Introduction 242<br/><br/>15.2 General Overview of CPSS in Intelligent Transportation 243<br/><br/>15.2.1 What is CPS? 243<br/><br/>15.2.2 Transition from CPS to CPSS 243<br/><br/>15.2.3 CPSS in Transportation 244<br/><br/>15.3 Conceptual Framework of CPSS in Transportation 244<br/><br/>15.4 Research Challenges 248<br/><br/>15.5 Discussion and Conclusion 248<br/><br/>References 249<br/><br/>16 Cyberspace for Smart Parenting with Sensors 253<br/>Alok Ranjan Prusty<br/><br/>16.1 Background 254<br/><br/>16.2 Internet of Things 254<br/><br/>16.2.1 Machine to Machine 255<br/><br/>16.2.2 Smart Wearables 255<br/><br/>16.2.3 Smart Parenting 256<br/><br/>16.2.4 Accelerometer Sensor 257<br/><br/>16.2.5 Pulse Sensor 257<br/><br/>16.3 Project 257<br/><br/>16.4 Steps and Working Principle 259<br/><br/>16.5 Result and Analysis 260<br/><br/>16.6 Conclusions 262<br/><br/>References 262
520 ## - SUMMARY, ETC.
Summary, etc "Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet of things
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social media
General subdivision Security measures.
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Le, Dac-Nhuong,
Dates associated with a name 1983-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bhatt, Chintan M.,
Dates associated with a name 1988-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Madhukar, Mani,
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Title Security designs for the cloud, IoT, and social networking
Edition First edition.
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2019]
International Standard Book Number 9781119592266
Record control number (DLC) 2019040594
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text available at Wiley Online Library Click here to view
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119593171
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY LIC Gateway 2021-09-24 ALBASA Consortium 51059 004.6782 Se266 2019 CL-51059 2021-09-24 2021-09-24 EBOOK
          COLLEGE LIBRARY COLLEGE LIBRARY LIC Gateway 2021-09-24   52055 004.67/82 CL-52055 2021-11-27 2021-09-24 EBOOK