IoT security issues:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
De/G Press
[2017]
|
Ausgabe: | First edition |
Schlagworte: | |
Beschreibung: | Online resource; title from PDF title page (EBSCO, viewed December 6, 2017). - Includes index |
Beschreibung: | 1 online resource (274) illustrations |
ISBN: | 9781501505775 1501505777 9781501505621 1501505629 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV045351656 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2017 xx a||| o|||| 00||| eng d | ||
020 | |a 9781501505775 |9 978-1-5015-0577-5 | ||
020 | |a 1501505777 |9 1-5015-0577-7 | ||
020 | |a 9781501505621 |9 978-1-5015-0562-1 | ||
020 | |a 1501505629 |9 1-5015-0562-9 | ||
024 | 3 | |a 9781501505621 | |
024 | 3 | |a 9781501505775 | |
035 | |a (ZDB-4-ITC)ocn973762321 | ||
035 | |a (OCoLC)973762321 | ||
035 | |a (DE-599)BVBBV045351656 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Gilchrist, Alasdair |d 1960- |e Verfasser |4 aut | |
245 | 1 | 0 | |a IoT security issues |c Alasdair Gilchrist |
250 | |a First edition | ||
264 | 1 | |a Boston |b De/G Press |c [2017] | |
264 | 4 | |c 2017 | |
300 | |a 1 online resource (274) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Online resource; title from PDF title page (EBSCO, viewed December 6, 2017). - Includes index | ||
505 | 8 | |a IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields | |
546 | |a In English | ||
650 | 7 | |a COMPUTERS / Databases / Data Mining |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
650 | 4 | |a Internet of things |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 1 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Gilchrist, Alasdair |t IoT security issues |b First edition |d Boston, [Massachusetts] ; Berlin, [Germany] : De G Press, c2017 |h xiv, 259 pages |z 9781501514746 |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-4-ITC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030738310 |
Datensatz im Suchindex
_version_ | 1818330269802823680 |
---|---|
adam_text | |
any_adam_object | |
author | Gilchrist, Alasdair 1960- |
author_facet | Gilchrist, Alasdair 1960- |
author_role | aut |
author_sort | Gilchrist, Alasdair 1960- |
author_variant | a g ag |
building | Verbundindex |
bvnumber | BV045351656 |
classification_rvk | ST 277 |
collection | ZDB-4-ITC |
contents | IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields |
ctrlnum | (ZDB-4-ITC)ocn973762321 (OCoLC)973762321 (DE-599)BVBBV045351656 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV045351656</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2017 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501505775</subfield><subfield code="9">978-1-5015-0577-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1501505777</subfield><subfield code="9">1-5015-0577-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501505621</subfield><subfield code="9">978-1-5015-0562-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1501505629</subfield><subfield code="9">1-5015-0562-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781501505621</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781501505775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn973762321</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)973762321</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045351656</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gilchrist, Alasdair</subfield><subfield code="d">1960-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IoT security issues</subfield><subfield code="c">Alasdair Gilchrist</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">De/G Press</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (274)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed December 6, 2017). - Includes index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Databases / Data Mining</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet of things</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Gilchrist, Alasdair</subfield><subfield code="t">IoT security issues</subfield><subfield code="b">First edition</subfield><subfield code="d">Boston, [Massachusetts] ; Berlin, [Germany] : De G Press, c2017</subfield><subfield code="h">xiv, 259 pages</subfield><subfield code="z">9781501514746</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030738310</subfield></datafield></record></collection> |
id | DE-604.BV045351656 |
illustrated | Illustrated |
indexdate | 2024-12-13T13:01:16Z |
institution | BVB |
isbn | 9781501505775 1501505777 9781501505621 1501505629 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030738310 |
oclc_num | 973762321 |
open_access_boolean | |
physical | 1 online resource (274) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | De/G Press |
record_format | marc |
spelling | Gilchrist, Alasdair 1960- Verfasser aut IoT security issues Alasdair Gilchrist First edition Boston De/G Press [2017] 2017 1 online resource (274) illustrations txt rdacontent c rdamedia cr rdacarrier Online resource; title from PDF title page (EBSCO, viewed December 6, 2017). - Includes index IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields In English COMPUTERS / Databases / Data Mining bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Internet of things fast Internet of things Computer networks Security measures Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Sicherheit (DE-588)4054790-5 s 2\p DE-604 Erscheint auch als Druck-Ausgabe Gilchrist, Alasdair IoT security issues First edition Boston, [Massachusetts] ; Berlin, [Germany] : De G Press, c2017 xiv, 259 pages 9781501514746 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gilchrist, Alasdair 1960- IoT security issues IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields COMPUTERS / Databases / Data Mining bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Internet of things fast Internet of things Computer networks Security measures Internet der Dinge (DE-588)7713781-4 gnd Sicherheit (DE-588)4054790-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)4054790-5 (DE-588)4274324-2 |
title | IoT security issues |
title_auth | IoT security issues |
title_exact_search | IoT security issues |
title_full | IoT security issues Alasdair Gilchrist |
title_fullStr | IoT security issues Alasdair Gilchrist |
title_full_unstemmed | IoT security issues Alasdair Gilchrist |
title_short | IoT security issues |
title_sort | iot security issues |
topic | COMPUTERS / Databases / Data Mining bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Internet of things fast Internet of things Computer networks Security measures Internet der Dinge (DE-588)7713781-4 gnd Sicherheit (DE-588)4054790-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Databases / Data Mining COMPUTERS / Information Technology COMPUTERS / Security / General Computer networks / Security measures Internet of things Internet of things Computer networks Security measures Internet der Dinge Sicherheit Computersicherheit |
work_keys_str_mv | AT gilchristalasdair iotsecurityissues |