000 03425nam a22005535i 4500
999 _c524162
_d524160
001 978-1-4842-2896-8
003 DE-He213
005 20200610151031.0
007 cr nn 008mamaa
008 190813s2020 xxu| s |||| 0|eng d
020 _a9781484228968
024 7 _a10.1007/978-1-4842-2896-8
_2doi
041 _aeng
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
072 7 _aUKN
_2thema
080 _a004.7
082 0 4 _a004.6
_223
100 1 _aCheruvu, Sunil.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9161768
245 1 0 _aDemystifying Internet of Things Security
_h[electronic resource] :
_bSuccessful IoT Device/Edge and Platform Security Deployment /
_cby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler.
250 _a1st ed. 2020.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2020.
300 _aXXX, 488 p. 152 illus., 134 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.
506 0 _aOpen Access
520 _aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.
650 0 _aComputer communication systems.
_9161769
650 0 _aComputer security.
_9161770
650 0 _aInformation technology.
_9161771
650 0 _aBusiness—Data processing.
_9161772
650 1 4 _aComputer Communication Networks.
_911881
650 2 4 _aSystems and Data Security.
_9161773
650 2 4 _aIT in Business.
_9161774
653 _aნივთების ინტერნეტი, უსაფრთხოება
700 1 _aKumar, Anil.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9161775
700 1 _aSmith, Ned.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9161776
700 1 _aWheeler, David M.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9161777
710 2 _aSpringerLink (Online service)
_9161778
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781484228951
776 0 8 _iPrinted edition:
_z9781484228975
856 4 0 _uhttps://doi.org/10.1007/978-1-4842-2896-8
942 _2udc
_cER