Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment (Record no. 46282)

MARC details
000 -LEADER
fixed length control field 02408nam a2200277Ia 4500
000 - LEADER
fixed length control field 02943naaa 00385uu
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/39473
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260218105625.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211013s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-1-4842-2896-8
024 ## - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4842-2896-8
042 ## - AUTHENTICATION CODE
Authentication code dc
245 #0 - TITLE STATEMENT
Title Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Berkeley, CA
Name of publisher, distributor, etc. Springer Nature
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (488 p.)
520 ## - SUMMARY, ETC.
Summary, etc. Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer science
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cheruvu, Sunil
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Anil
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Smith, Ned
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wheeler, David M.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://docs.google.com/spreadsheets/d/1yKIrdCPDAG_9c22mwoOIO2DOhtj65Wqa/edit?usp=sharing&ouid=106555315294820607512&rtpof=true&sd=true ">https://docs.google.com/spreadsheets/d/1yKIrdCPDAG_9c22mwoOIO2DOhtj65Wqa/edit?usp=sharing&ouid=106555315294820607512&rtpof=true&sd=true </a>
Link text List of Curated E-Books
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Book
Holdings
Withdrawn status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Library of Congress Classification   Not For Loan Directory of Open Access Books Directory of Open Access Books 12/22/2021   12/22/2021 12/22/2021 E-Book

University of Rizal System
Email us at univlibservices@urs.edu.ph

Visit our Website www.urs.edu.ph/library