000 | 03425nam a22005535i 4500 | ||
---|---|---|---|
999 |
_c524162 _d524160 |
||
001 | 978-1-4842-2896-8 | ||
003 | DE-He213 | ||
005 | 20200610151031.0 | ||
007 | cr nn 008mamaa | ||
008 | 190813s2020 xxu| s |||| 0|eng d | ||
020 | _a9781484228968 | ||
024 | 7 |
_a10.1007/978-1-4842-2896-8 _2doi |
|
041 | _aeng | ||
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
080 | _a004.7 | ||
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aCheruvu, Sunil. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9161768 |
|
245 | 1 | 0 |
_aDemystifying Internet of Things Security _h[electronic resource] : _bSuccessful IoT Device/Edge and Platform Security Deployment / _cby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aBerkeley, CA : _bApress : _bImprint: Apress, _c2020. |
|
300 |
_aXXX, 488 p. 152 illus., 134 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. | |
506 | 0 | _aOpen Access | |
520 | _aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. | ||
650 | 0 |
_aComputer communication systems. _9161769 |
|
650 | 0 |
_aComputer security. _9161770 |
|
650 | 0 |
_aInformation technology. _9161771 |
|
650 | 0 |
_aBusiness—Data processing. _9161772 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _911881 |
650 | 2 | 4 |
_aSystems and Data Security. _9161773 |
650 | 2 | 4 |
_aIT in Business. _9161774 |
653 | _aნივთების ინტერნეტი, უსაფრთხოება | ||
700 | 1 |
_aKumar, Anil. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9161775 |
|
700 | 1 |
_aSmith, Ned. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9161776 |
|
700 | 1 |
_aWheeler, David M. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9161777 |
|
710 | 2 |
_aSpringerLink (Online service) _9161778 |
|
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781484228951 |
776 | 0 | 8 |
_iPrinted edition: _z9781484228975 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-1-4842-2896-8 |
942 |
_2udc _cER |