Amazon cover image
Image from Amazon.com

IoT security issues / Alasdair Gilchrist.

By: Material type: TextTextPublisher: Boston : De/G Press, [2017]Copyright date: ©2017Edition: First editionDescription: 1 online resource (274) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781501505775
  • 1501505777
  • 9781501505621
  • 1501505629
Subject(s): Genre/Form: Additional physical formats: Print version:: IoT security issues.DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.8857 .G55 2017
Online resources:
Contents:
Introduction ; Part I: Making Sense of the Hype ; Chapter 1 -- The Consumer Internet of Things ; A Wave of Technology, or a Wave of Hype ; IoT Skeptics and the Role of Security Issues ; The Internet of No-thing ; Where are these IoT devices?
Why the ambiguity in IoT uptake? The Media and Marketing Hype ; Lack of Killer Applications ; There be Monsters ; Buying Secure IoT Devices? ; Making Things That Just Work ; Is this a consumer Internet of things? ; Skepticism, but the future looks bright.
Consumer Trust -- or Lack of It Losing Control? ; Toys for the Rich ; IoT isn't DIY ; Is Security a Major Inhibitor? ; Part II: Security ; Chapter 2 -- It's Not Just About the Future ; Looking back to move forward ; Security by Design ; Data Mobile Networks.
A Confluence of New Technologies Basic Security Practices ; Chapter 3 -- Flawed, Insecure Devices ; Why are so many insecure devices on the market? ; A Manufacturer's Perspective ; The Device Production Cycle ; Software development in an agile market ; Clash of Cultures.
Developers and the Security Puzzle Reputational loss ; Chapter 4 -- Securing the Unidentified ; The Scale of the Problem ; What Type of Devices to Secure? ; Unplanned Change ; The Consumer's View on Security ; Chapter 5 -- Consumer Convenience Trumps Security ; Plug n' Pray.
Easy install -- no truck rolls.
Summary: IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Online resource; title from PDF title page (EBSCO, viewed December 6, 2017).

Introduction ; Part I: Making Sense of the Hype ; Chapter 1 -- The Consumer Internet of Things ; A Wave of Technology, or a Wave of Hype ; IoT Skeptics and the Role of Security Issues ; The Internet of No-thing ; Where are these IoT devices?

Why the ambiguity in IoT uptake? The Media and Marketing Hype ; Lack of Killer Applications ; There be Monsters ; Buying Secure IoT Devices? ; Making Things That Just Work ; Is this a consumer Internet of things? ; Skepticism, but the future looks bright.

Consumer Trust -- or Lack of It Losing Control? ; Toys for the Rich ; IoT isn't DIY ; Is Security a Major Inhibitor? ; Part II: Security ; Chapter 2 -- It's Not Just About the Future ; Looking back to move forward ; Security by Design ; Data Mobile Networks.

A Confluence of New Technologies Basic Security Practices ; Chapter 3 -- Flawed, Insecure Devices ; Why are so many insecure devices on the market? ; A Manufacturer's Perspective ; The Device Production Cycle ; Software development in an agile market ; Clash of Cultures.

Developers and the Security Puzzle Reputational loss ; Chapter 4 -- Securing the Unidentified ; The Scale of the Problem ; What Type of Devices to Secure? ; Unplanned Change ; The Consumer's View on Security ; Chapter 5 -- Consumer Convenience Trumps Security ; Plug n' Pray.

Easy install -- no truck rolls.

Includes index.

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

In English.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library