Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler
By: Cheruvu, Sunil [author].
Contributor(s): Anil Kumar [author] | Smith, Ned [author] | Wheeler, David [author] | Ohio Library and Information Network.
Publisher: New York : Apress, ©2020Description: 488 p: illustrations (black and white, and color).Content type: text Media type: computer Carrier type: online resourceISBN: 9781484228951.Subject(s): Internet of things -- Security measuresGenre/Form: Electronic books | Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | TK5105.8857 .C58 2020 (Browse shelf) | Available | AU00000000016363 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
TK5105.8857 .C533 2021 Practical IoT hacking : the definitive guide to attacking the internet of things / | TK5105.8857 .C54 2019 Internet of things, for things, and by things / | TK5105.8857 .C55 2019 Internet of things : architectures, protocols and standards / | TK5105.8857 .C58 2020 Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / | TK5105.8857 .D47 2023 Building Enterprise IoT Solutions with Eclipse IoT Technologies An Open Source Approach to Edge Computing | TK5105.8857 .E279 2018 Easy Steps to Managing Cybersecurity. | TK5105.8857 .F76 2018 From internet of things to smart cities : enabling technologies / |
Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements
Available to OhioLINK libraries
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions