| 000 | 02975naaaa2200397uu 4500 | ||
|---|---|---|---|
| 001 | https://directory.doabooks.org/handle/20.500.12854/39473 | ||
| 005 | 20220220001201.0 | ||
| 020 | _a978-1-4842-2896-8 | ||
| 024 | 7 |
_a10.1007/978-1-4842-2896-8 _cdoi |
|
| 041 | 0 | _aEnglish | |
| 042 | _adc | ||
| 072 | 7 |
_aKJQ _2bicssc |
|
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aUR _2bicssc |
|
| 100 | 1 |
_aCheruvu, Sunil _4auth |
|
| 700 | 1 |
_aKumar, Anil _4auth |
|
| 700 | 1 |
_aSmith, Ned _4auth |
|
| 700 | 1 |
_aWheeler, David M. _4auth |
|
| 245 | 1 | 0 | _aDemystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment |
| 260 |
_aBerkeley, CA _bSpringer Nature _c2020 |
||
| 300 | _a1 electronic resource (488 p.) | ||
| 506 | 0 |
_aOpen Access _2star _fUnrestricted online access |
|
| 520 | _aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. | ||
| 540 |
_aCreative Commons _fhttps://creativecommons.org/licenses/by/4.0 _2cc _4https://creativecommons.org/licenses/by/4.0 |
||
| 546 | _aEnglish | ||
| 650 | 7 |
_aBusiness mathematics & systems _2bicssc |
|
| 650 | 7 |
_aNetwork hardware _2bicssc |
|
| 650 | 7 |
_aComputer security _2bicssc |
|
| 653 | _aComputer science | ||
| 653 | _aComputer communication systems | ||
| 653 | _aComputer security | ||
| 653 | _aInformation technology | ||
| 653 | _aBusiness—Data processing | ||
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://library.oapen.org/bitstream/20.500.12657/22840/1/1007321.pdf _70 _zDOAB: download the publication |
| 856 | 4 | 0 |
_awww.oapen.org _uhttps://directory.doabooks.org/handle/20.500.12854/39473 _70 _zDOAB: description of the publication |
| 999 |
_c53033 _d53033 |
||