Practical internet of things security :: a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world /
Annotation
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
[2016]
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Annotation |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource : illustrations. |
ISBN: | 9781785880292 1785880292 1523106263 9781523106264 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn953694676 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160718t20162016enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d YDXCP |d IDEBK |d N$T |d OCL |d KSU |d DEBSZ |d TEFOD |d DEBBG |d C6I |d LIP |d OCLCQ |d OCLCA |d CEF |d INT |d OCLCQ |d MQY |d AGLDB |d IGB |d UKAHL |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 953054105 |a 1259222412 | ||
020 | |a 9781785880292 |q (electronic bk.) | ||
020 | |a 1785880292 |q (electronic bk.) | ||
020 | |z 9781785889639 | ||
020 | |z 178588963X | ||
020 | |a 1523106263 | ||
020 | |a 9781523106264 | ||
035 | |a (OCoLC)953694676 |z (OCoLC)953054105 |z (OCoLC)1259222412 | ||
037 | |a CL0500000763 |b Safari Books Online | ||
037 | |a DAC16AB9-C07B-4CEE-BBB1-30AC51BEBACA |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Russell, Brian, |e author. | |
245 | 1 | 0 | |a Practical internet of things security : |b a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / |c Brian Russell, Drew Van Duren. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 online resource : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed July 13, 2016). | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. | |
650 | 0 | |a Internet of things. |0 http://id.loc.gov/authorities/subjects/sh2013000266 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Database management. |0 http://id.loc.gov/authorities/subjects/sh85035848 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Internet des objets. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Bases de données |x Gestion. | |
650 | 7 | |a COMPUTERS |x Internet Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Database management |2 fast | |
650 | 7 | |a Internet of things |2 fast | |
700 | 1 | |a Van Duren, Drew, |e author. | |
758 | |i has work: |a Practical Internet of Things security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYDVD3Hg4wbfB3WYVWhBcd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 178588963X |z 9781785889639 |w (OCoLC)948336805 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261878 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261878 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH30656405 | ||
938 | |a EBSCOhost |b EBSC |n 1261878 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34514608 | ||
938 | |a YBP Library Services |b YANK |n 13057682 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn953694676 |
---|---|
_version_ | 1829095074856697856 |
adam_text | |
any_adam_object | |
author | Russell, Brian Van Duren, Drew |
author_facet | Russell, Brian Van Duren, Drew |
author_role | aut aut |
author_sort | Russell, Brian |
author_variant | b r br d d v dd ddv |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)953694676 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06429cam a2200769 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn953694676</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">160718t20162016enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">KSU</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">DEBBG</subfield><subfield code="d">C6I</subfield><subfield code="d">LIP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">CEF</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MQY</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">953054105</subfield><subfield code="a">1259222412</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785880292</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785880292</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781785889639</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">178588963X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1523106263</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781523106264</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953694676</subfield><subfield code="z">(OCoLC)953054105</subfield><subfield code="z">(OCoLC)1259222412</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000763</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">DAC16AB9-C07B-4CEE-BBB1-30AC51BEBACA</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Brian,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical internet of things security :</subfield><subfield code="b">a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world /</subfield><subfield code="c">Brian Russell, Drew Van Duren.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed July 13, 2016).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000266</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035848</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet des objets.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Bases de données</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Van Duren, Drew,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Practical Internet of Things security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYDVD3Hg4wbfB3WYVWhBcd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">178588963X</subfield><subfield code="z">9781785889639</subfield><subfield code="w">(OCoLC)948336805</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261878</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261878</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30656405</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1261878</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis34514608</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13057682</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn953694676 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:43:15Z |
institution | BVB |
isbn | 9781785880292 1785880292 1523106263 9781523106264 |
language | English |
oclc_num | 953694676 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations. |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Russell, Brian, author. Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Brian Russell, Drew Van Duren. Birmingham, UK : Packt Publishing, [2016] ©2016 1 online resource : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Community experience distilled Online resource; title from cover (Safari, viewed July 13, 2016). Includes index. Annotation A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Database management. http://id.loc.gov/authorities/subjects/sh85035848 Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet des objets. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Bases de données Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computer networks Security measures fast Database management fast Internet of things fast Van Duren, Drew, author. has work: Practical Internet of Things security (Text) https://id.oclc.org/worldcat/entity/E39PCYDVD3Hg4wbfB3WYVWhBcd https://id.oclc.org/worldcat/ontology/hasWork Print version: 178588963X 9781785889639 (OCoLC)948336805 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 |
spellingShingle | Russell, Brian Van Duren, Drew Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Community experience distilled. Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Database management. http://id.loc.gov/authorities/subjects/sh85035848 Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet des objets. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Bases de données Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computer networks Security measures fast Database management fast Internet of things fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013000266 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85035848 https://id.nlm.nih.gov/mesh/D016494 |
title | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / |
title_auth | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / |
title_exact_search | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / |
title_full | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Brian Russell, Drew Van Duren. |
title_fullStr | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Brian Russell, Drew Van Duren. |
title_full_unstemmed | Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Brian Russell, Drew Van Duren. |
title_short | Practical internet of things security : |
title_sort | practical internet of things security a practical indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our iot connected world |
title_sub | a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / |
topic | Internet of things. http://id.loc.gov/authorities/subjects/sh2013000266 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Database management. http://id.loc.gov/authorities/subjects/sh85035848 Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet des objets. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Bases de données Gestion. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computer networks Security measures fast Database management fast Internet of things fast |
topic_facet | Internet of things. Computer networks Security measures. Computer security. Database management. Computer Security Internet des objets. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Bases de données Gestion. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Computer networks Security measures Database management Internet of things |
work_keys_str_mv | AT russellbrian practicalinternetofthingssecurityapracticalindispensablesecurityguidethatwillnavigateyouthroughthecomplexrealmofsecurelybuildinganddeployingsystemsinouriotconnectedworld AT vandurendrew practicalinternetofthingssecurityapracticalindispensablesecurityguidethatwillnavigateyouthroughthecomplexrealmofsecurelybuildinganddeployingsystemsinouriotconnectedworld |