000866288 000__ 01722cam\a2200469Ii\4500 000866288 001__ 866288 000866288 005__ 20230306145819.0 000866288 006__ m\\\\\o\\d\\\\\\\\ 000866288 007__ cr\cn\nnnunnun 000866288 008__ 190325s2019\\\\sz\\\\\\ob\\\\001\0\eng\d 000866288 019__ $$a1090684214$$a1090911284 000866288 020__ $$a9783030049843$$q(electronic book) 000866288 020__ $$a3030049841$$q(electronic book) 000866288 020__ $$z9783030049836 000866288 020__ $$z3030049833 000866288 035__ $$aSP(OCoLC)on1090539830 000866288 035__ $$aSP(OCoLC)1090539830$$z(OCoLC)1090684214$$z(OCoLC)1090911284 000866288 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dYDX$$dGW5XE$$dEBLCP$$dUKMGB 000866288 049__ $$aISEA 000866288 050_4 $$aQA76.9.D314 000866288 08204 $$a005.8$$223 000866288 24500 $$aInternet of Things Security and Data Protection /$$cSĂ©bastien Ziegler, editor. 000866288 264_1 $$aCham, Switzerland :$$bSpringer Nature,$$c[2019] 000866288 300__ $$a1 online resource. 000866288 336__ $$atext$$btxt$$2rdacontent 000866288 337__ $$acomputer$$bc$$2rdamedia 000866288 338__ $$aonline resource$$bcr$$2rdacarrier 000866288 4901_ $$aInternet of Things 000866288 504__ $$aIncludes bibliographic references and index. 000866288 506__ $$aAccess limited to authorized users. 000866288 588__ $$aOnline resource; title from PDF title page (viewed March 26, 2019). 000866288 650_0 $$aData protection. 000866288 650_0 $$aSoftware protection. 000866288 650_0 $$aInformation technology. 000866288 650_0 $$aInformation services industry$$xSecurity measures. 000866288 7001_ $$aZiegler, SĂ©bastien,$$eeditor. 000866288 77608 $$iPrint version: $$z3030049833$$z9783030049836$$w(OCoLC)1059250640 000866288 830_0 $$aInternet of things. 000866288 852__ $$bebk 000866288 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-04984-3$$zOnline Access$$91397441.1 000866288 909CO $$ooai:library.usi.edu:866288$$pGLOBAL_SET 000866288 980__ $$aEBOOK 000866288 980__ $$aBIB 000866288 982__ $$aEbook 000866288 983__ $$aOnline 000866288 994__ $$a92$$bISE