Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Free Shipping On Orders Over $35!
Your order must be $35 or more to qualify for free economy shipping.
Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
Get Rewarded for Ordering Your Textbooks!Enroll Now
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Summary
This book addresses the integration of new devices (such as the iPhone), new technologies (such as cloud computing and green computing), and new software systems in pervasive and ubiquitous computing from the point of view of security, trust, and privacy (STP). It provides an overview of recent progress in ubiquitous and pervasive computing, examining current practices, trends, and challenges. The book covers theoretical approaches, mathematical models, empirical research, practical implementations, and diverse application areas, along with a rich and useful presentation of strategies for security issues in different computing areas.