000 03385nam a22005655i 4500
001 978-1-4842-2896-8
003 DE-He213
005 20240508091357.0
007 cr nn 008mamaa
008 190813s2020 xxu| s |||| 0|eng d
020 _a9781484228968
_9978-1-4842-2896-8
024 7 _a10.1007/978-1-4842-2896-8
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aCheruvu, Sunil.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aDemystifying Internet of Things Security
_h[electronic resource] :
_bSuccessful IoT Device/Edge and Platform Security Deployment /
_cby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler.
250 _a1st ed. 2020.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2020.
300 _aXXX, 488 p. 152 illus., 134 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.
506 0 _aOpen Access
520 _aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.
650 0 _aComputer networks .
650 0 _aData protection.
650 0 _aBusiness information services.
650 1 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
650 2 4 _aIT in Business.
700 1 _aKumar, Anil.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aSmith, Ned.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aWheeler, David M.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9781484228951
776 0 8 _iPrinted edition:
_z9781484228975
776 0 8 _iPrinted edition:
_z9781484267295
856 4 0 _uhttps://doi.org/10.1007/978-1-4842-2896-8
912 _aZDB-2-CWD
912 _aZDB-2-SXPC
912 _aZDB-2-SOB
999 _c37784
_d37784