000 | 03385nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-1-4842-2896-8 | ||
003 | DE-He213 | ||
005 | 20240508091357.0 | ||
007 | cr nn 008mamaa | ||
008 | 190813s2020 xxu| s |||| 0|eng d | ||
020 |
_a9781484228968 _9978-1-4842-2896-8 |
||
024 | 7 |
_a10.1007/978-1-4842-2896-8 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aCheruvu, Sunil. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aDemystifying Internet of Things Security _h[electronic resource] : _bSuccessful IoT Device/Edge and Platform Security Deployment / _cby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aBerkeley, CA : _bApress : _bImprint: Apress, _c2020. |
|
300 |
_aXXX, 488 p. 152 illus., 134 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. | |
506 | 0 | _aOpen Access | |
520 | _aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 0 | _aBusiness information services. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aIT in Business. |
700 | 1 |
_aKumar, Anil. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aSmith, Ned. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aWheeler, David M. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9781484228951 |
776 | 0 | 8 |
_iPrinted edition: _z9781484228975 |
776 | 0 | 8 |
_iPrinted edition: _z9781484267295 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-1-4842-2896-8 |
912 | _aZDB-2-CWD | ||
912 | _aZDB-2-SXPC | ||
912 | _aZDB-2-SOB | ||
999 |
_c37784 _d37784 |