|
|
|||
|
||||
OverviewThis book examines the issue of security across the logical layers of a network embedded system - adopting both technological and sociological perspectives. The authors take a holistic approach to discussing security in network embedded systems built on widespread experience from research projects and practical deployments, involving authors from both academic and industrial backgrounds. The book concentrates on the main problem of technology - how to make it acceptably secure. This problem is considered from different perspectives, such as technical, social, ethical, etc. The authors consider potential solution on different levels (application, network, middleware, etc). Written to educate potential developers and researchers in the area of ubiquitous computing, this book informs about the real issues in security as viewed from a systematic perspective, with further issues in social acceptability as a natural consequence of the nature of the technology - this is essential reading for graduates and practitioners. Full Product DetailsAuthor: Stephen Hailes , Alexandr SeleznyovPublisher: Springer London Ltd Imprint: Springer London Ltd ISBN: 9781846285523ISBN 10: 1846285526 Pages: 300 Publication Date: November 2007 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Temporarily unavailable The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you. Table of ContentsIntroduction, background and motivation.- Introduction.- Motivation. -Challenges of design.- Social acceptance of hidden technology.- Complexity of software development.- Complexity of management.- Usability assessment methodologies.- Networked Embedded Systems ? a systematic perspective on security issues.- Application design.- Middleware.- Networking.- Case studies.- Healthcare.- Buildings.- Disaster management.- Social impact.- A social cost-benefit analysis: qualitative vs quantitative analysis.- Education and expectation management (in terms of security for networked embedded systems).- The role of regulation and the law.- Corporate social responsibility.- The effect of media on debate.- The future of pervasive systems.- Critical summary and conclusionsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |