Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment (Record no. 53033)

MARC details
000 -LEADER
fixed length control field 02975naaaa2200397uu 4500
001 - CONTROL NUMBER
control field https://directory.doabooks.org/handle/20.500.12854/39473
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220220001201.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-1-4842-2896-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4842-2896-8
Terms of availability doi
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title English
042 ## - AUTHENTICATION CODE
Authentication code dc
072 #7 - SUBJECT CATEGORY CODE
Subject category code KJQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UKN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Cheruvu, Sunil
Relationship auth
245 10 - TITLE STATEMENT
Title Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Berkeley, CA
Name of publisher, distributor, etc. Springer Nature
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic resource (488 p.)
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
Source of term star
Standardized terminology for access restriction Unrestricted online access
520 ## - SUMMARY, ETC.
Summary, etc. Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Creative Commons
Use and reproduction rights https://creativecommons.org/licenses/by/4.0
Source of term cc
-- https://creativecommons.org/licenses/by/4.0
546 ## - LANGUAGE NOTE
Language note English
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business mathematics & systems
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Network hardware
Source of heading or term bicssc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term bicssc
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer science
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer communication systems
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Computer security
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Information technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Business—Data processing
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Anil
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Smith, Ned
Relationship auth
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wheeler, David M.
Relationship auth
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf">https://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf</a>
Access status 0
Public note DOAB: download the publication
856 40 - ELECTRONIC LOCATION AND ACCESS
Host name www.oapen.org
Uniform Resource Identifier <a href="https://directory.doabooks.org/handle/20.500.12854/39473">https://directory.doabooks.org/handle/20.500.12854/39473</a>
Access status 0
Public note DOAB: description of the publication

No items available.