Normal view MARC view ISBD view

Demystifying Internet of Things Security [electronic resource] :Successful IoT Device/Edge and Platform Security Deployment / by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler.

By: Cheruvu, Sunil [author.].
Contributor(s): Kumar, Anil [author.] | Smith, Ned [author.] | Wheeler, David M [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: Berkeley, CA : Apress : Imprint: Apress, 2020.Edition: 1st ed. 2020.Description: XXX, 488 p. 152 illus., 134 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781484228968.Subject(s): Computer communication systems | Computer security | Information technology | Business—Data processing | Computer Communication Networks | Systems and Data Security | IT in Business | ნივთების ინტერნეტი, უსაფრთხოებაDDC classification: 004.6 Online resources: Click here to access online
Contents:
Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.
In: Springer eBooksSummary: Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
No physical items for this record

Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.

Open Access

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.

There are no comments for this item.

Log in to your account to post a comment.

ეროვნული სამეცნიერო ბიბლიოთეკა 2010 - 2019

გაუგზავნე შეკითხვა ან მოთხოვნა ბიბლიოთეკას