Trends in IT Services (Internet of Things).docx

Retrieved from bill ban hard coded

Info icon This preview shows pages 8–10. Sign up to view the full content.

Retrieved from - passwords-iot-devices/2017/08/
Image of page 8

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Running head: TRENDS IN THE IT SERVICES INDUSTRY 9 Kerravala, Z. (2015, December 17). How network segmentation provides a path to IoT security. Retrieved from - segmentation-provides-a-path-to-iot-security.html Langmeyer, N. (n.d.). IoT Cloud Security: Super-Sized Concerns That Require Super-Sized Diligence. Retrieved from - security-super-sized-concerns-that-require-super-sized-diligence Lee, P., & Stewart, D. (2018). Technology, media, and telecommunications predictions : 2018 . Retrieved from Deloitte. mediatelecommunications/gx-deloitte-tmt-2018-predictions-full-report.pdf Nair, M., & Sutter, D. (2018). The blockchain and increasing cooperative efficacy. Independent Review , 22 (4), 529–550. Retrieved from ? url= ? direct=true&db=asn&AN=128754856&site=ehost-live&scope=site Paul, F. (2018, April 09). The future of enterprise IoT. Retrieved from - enterprise-iot.html Snow, J. (2018, March-April). AI for everybody: Making machine-learning tools available through cloud services could spread artificial intelligence far and wide. MIT Technology Review , 121 (2), 40+. Retrieved from ? u=umd_umuc&sid=CDB&xid=6f364a95
Image of page 9
Running head: TRENDS IN THE IT SERVICES INDUSTRY 10 Stergiou, C., Psannis, K. E., Kim, B., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78 , 964-975. doi:10.1016/j.future.2016.11.031 Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things. Foresight , 19 (1), 1–14. - org.ezproxy.umuc.edu/10.1108/FS-11-2016-0056
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '16
  • Dr. Bass
  • Cybersecurity, Computer Security, Security guard, History of the Internet

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern