Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment (Record no. 53033)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02975naaaa2200397uu 4500 |
| 001 - CONTROL NUMBER | |
| control field | https://directory.doabooks.org/handle/20.500.12854/39473 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220220001201.0 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 978-1-4842-2896-8 |
| 024 7# - OTHER STANDARD IDENTIFIER | |
| Standard number or code | 10.1007/978-1-4842-2896-8 |
| Terms of availability | doi |
| 041 0# - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | KJQ |
| Source | bicssc |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | UKN |
| Source | bicssc |
| 072 #7 - SUBJECT CATEGORY CODE | |
| Subject category code | UR |
| Source | bicssc |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Cheruvu, Sunil |
| Relationship | auth |
| 245 10 - TITLE STATEMENT | |
| Title | Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Berkeley, CA |
| Name of publisher, distributor, etc. | Springer Nature |
| Date of publication, distribution, etc. | 2020 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 electronic resource (488 p.) |
| 506 0# - RESTRICTIONS ON ACCESS NOTE | |
| Terms governing access | Open Access |
| Source of term | star |
| Standardized terminology for access restriction | Unrestricted online access |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. |
| 540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
| Terms governing use and reproduction | Creative Commons |
| Use and reproduction rights | https://creativecommons.org/licenses/by/4.0 |
| Source of term | cc |
| -- | https://creativecommons.org/licenses/by/4.0 |
| 546 ## - LANGUAGE NOTE | |
| Language note | English |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Business mathematics & systems |
| Source of heading or term | bicssc |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Network hardware |
| Source of heading or term | bicssc |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security |
| Source of heading or term | bicssc |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Computer science |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Computer communication systems |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Computer security |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Information technology |
| 653 ## - INDEX TERM--UNCONTROLLED | |
| Uncontrolled term | Business—Data processing |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Kumar, Anil |
| Relationship | auth |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Smith, Ned |
| Relationship | auth |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Wheeler, David M. |
| Relationship | auth |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf">https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf</a> |
| Access status | 0 |
| Public note | DOAB: download the publication |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Host name | www.oapen.org |
| Uniform Resource Identifier | <a href="https://directory.doabooks.org/handle/20.500.12854/39473">https://directory.doabooks.org/handle/20.500.12854/39473</a> |
| Access status | 0 |
| Public note | DOAB: description of the publication |
No items available.
