Securing the Internet of Things: An End-to-End Strategy Guide for Product and Service Security
Seiten
2016
McGraw-Hill Education (Verlag)
978-1-259-58828-0 (ISBN)
McGraw-Hill Education (Verlag)
978-1-259-58828-0 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
Develop, deploy, and administer an effective security framework for IoT-oriented products and services
Securing the Internet of Things: A Practical Guide to Architecting, Implementing, and Managing IoT Product and Service Security lays out end-to-end IoT security strategies. You will learn how to vastly improve your organization's security posture and minimize the potential long-term costs that result from inadequate security.
This practical resource fully explains existing product and service models common to the IoT landscape and teaches, step-by-step, the process of evaluating IoT security risks from both an architectural and component perspective. The book clearly explains how to identify and prioritize risks that affect both organizations and end users. You will discover how to build an IoT security framework, develop accurate threat models, detect and block malicious activity, and securely manage unmanned systems.
* Shows how to manage devices and detect bad actors
* Features instructions for setting up a personal IoT lab environment
* Written by a recognized information security expert who regularly speaks at industry events
Securing the Internet of Things: A Practical Guide to Architecting, Implementing, and Managing IoT Product and Service Security lays out end-to-end IoT security strategies. You will learn how to vastly improve your organization's security posture and minimize the potential long-term costs that result from inadequate security.
This practical resource fully explains existing product and service models common to the IoT landscape and teaches, step-by-step, the process of evaluating IoT security risks from both an architectural and component perspective. The book clearly explains how to identify and prioritize risks that affect both organizations and end users. You will discover how to build an IoT security framework, develop accurate threat models, detect and block malicious activity, and securely manage unmanned systems.
* Shows how to manage devices and detect bad actors
* Features instructions for setting up a personal IoT lab environment
* Written by a recognized information security expert who regularly speaks at industry events
Don A. Bailey (Denver, CO) is a pioneer in security for mobile technology, the Internet of Things, and embedded systems. He has a long history of ground-breaking research protecting mobile users from worldwide tracking systems, securing automobiles from remote attack, and mitigating crippling IoT risks.
Chapter 1: Defining IoT
Chapter 2: Defining IoT Security
Chapter 3: The Trusted Computing Base
Chapter 4: The IoT Life Cycle
Chapter 5: Risks & Mitigations
Chapter 6: Minotring in IoT Environments
Chapter 7: Incident Response in IoT
Chapter 8: IoT Security Policy & Procedures
Chapter 9: Putting It All Together
| Erscheint lt. Verlag | 16.12.2016 |
|---|---|
| Verlagsort | OH |
| Sprache | englisch |
| Themenwelt | Schulbuch / Wörterbuch ► Lexikon / Chroniken |
| Sonstiges ► Geschenkbücher | |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Mathematik / Informatik ► Informatik ► Web / Internet | |
| ISBN-10 | 1-259-58828-9 / 1259588289 |
| ISBN-13 | 978-1-259-58828-0 / 9781259588280 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Lehrbuch für Prüfung und Praxis
Buch | Softcover (2023)
Springer Fachmedien Wiesbaden GmbH (Verlag)
CHF 27,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95