Indices1
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks

Copyright: © 2022 |Pages: 313
ISBN13: 9781668439210|ISBN10: 1668439212|ISBN13 Softcover: 9781668439227|EISBN13: 9781668439234
DOI: 10.4018/978-1-6684-3921-0
Cite Book Cite Book

MLA

Sahoo, Biswa Mohan, and Suman Avdhesh Yadav, editors. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks. IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3921-0

APA

Sahoo, B. M. & Yadav, S. A. (Eds.). (2022). Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks. IGI Global. https://doi.org/10.4018/978-1-6684-3921-0

Chicago

Sahoo, Biswa Mohan, and Suman Avdhesh Yadav, eds. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3921-0

Export Reference

Mendeley
Favorite Full-Book Download

Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks.

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.