BOOKS - Industrial Internet of Things Security Protecting AI-Enabled Engineering Syst...
Industrial Internet of Things Security Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments - Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu 2025 PDF | EPUB CRC Press BOOKS
US $5.76

Views
61672
Industrial Internet of Things Security Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments
Author: Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu
Year: 2025
Number of pages: 247
Format: PDF | EPUB
File size: 17.1 MB
Language: ENG

The industrial landscape is changing rapidly, and so is global society. This change is driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. IIoT and AI are transforming the way industrial engineering is done, enabling new levels of automation, productivity, and efficiency. However, as IIoT and AI become more pervasive in the industrial world, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems. Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments provides a comprehensive guide to IIoT security, covering topics such as network architecture, risk management, data security, and compliance. It addresses the unique security challenges that the cloud and edge environments pose, providing practical guidance for securing IIoT networks in these contexts. It includes numerous real-world case studies and examples, providing readers with practical insights into how IIoT security and AI-enabled industrial engineering are being implemented in various industries. Best practices are emphasized for the readers to ensure the reliability, safety, and security of their systems while also learning the latest developments in IIoT security for AI-enabled industrial engineering systems in this rapidly evolving field. By offering step-by-step guidance for the implantation process along with best practices, this book becomes a valuable resource for practitioners and engineers in the areas of industrial engineering, IT, computer engineering, and anyone looking to secure their IIoT network against cyber threats.

You may also be interested in: