000 06428cam a2200829Ii 4500
001 ocn953694676
003 OCoLC
005 20220712034659.0
006 m o d
007 cr unu||||||||
008 160718t20162016enka o 001 0 eng d
040 _aUMI
_beng
_erda
_epn
_cUMI
_dOCLCF
_dYDXCP
_dIDEBK
_dN$T
_dOCL
_dKSU
_dDEBSZ
_dTEFOD
_dDEBBG
_dC6I
_dLIP
_dOCLCQ
_dOCLCA
_dCEF
_dINT
_dOCLCQ
_dMQY
_dAGLDB
_dIGB
_dUKAHL
_dOCLCO
019 _a953054105
020 _a9781785880292
_q(electronic bk.)
020 _a1785880292
_q(electronic bk.)
020 _z9781785889639
020 _z178588963X
029 1 _aAU@
_b000058630477
029 1 _aDEBBG
_bBV043969789
029 1 _aDEBSZ
_b480370885
029 1 _aDEBSZ
_b485803178
029 1 _aGBVCP
_b882757873
029 1 _aAU@
_b000067107585
035 _a(OCoLC)953694676
_z(OCoLC)953054105
037 _aCL0500000763
_bSafari Books Online
037 _aDAC16AB9-C07B-4CEE-BBB1-30AC51BEBACA
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.9.A25
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aRussell, Brian,
_eauthor.
_91118766
245 1 0 _aPractical internet of things security :
_ba practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world /
_cBrian Russell, Drew Van Duren.
264 1 _aBirmingham, UK :
_bPackt Publishing,
_c[2016]
264 4 _c©2016
300 _a1 online resource :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aCommunity experience distilled
588 0 _aOnline resource; title from cover (Safari, viewed July 13, 2016).
500 _aIncludes index.
520 8 _aAnnotation
_bA practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.
590 _aeBooks on EBSCOhost
_bEBSCO eBook Subscription Academic Collection - Worldwide
650 0 _aInternet of things.
_964480
650 0 _aComputer networks
_xSecurity measures.
_936449
650 0 _aComputer security.
_9372
650 0 _aDatabase management.
_96422
650 2 _aComputer Security
_9372
650 6 _aInternet des objets.
_91056042
650 6 _aRéseaux d'ordinateurs
_xSécurité
_xMesures.
_9875418
650 6 _aSécurité informatique.
_9869458
650 6 _aBases de données
_xGestion.
_9875401
650 7 _aCOMPUTERS
_xInternet Security.
_2bisacsh
_91118767
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
_9871408
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
_9852381
650 7 _aComputer security
_2fast
_0(OCoLC)fst00872484
_9372
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_936449
650 7 _aDatabase management.
_2fast
_0(OCoLC)fst00888037
_96422
650 7 _aInternet of things.
_2fast
_0(OCoLC)fst01894151
_964480
655 4 _aElectronic books.
700 1 _aVan Duren, Drew,
_eauthor.
_91118768
776 0 8 _iPrint version:
_z178588963X
_z9781785889639
_w(OCoLC)948336805
830 0 _aCommunity experience distilled.
856 4 0 _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1261878
938 _aAskews and Holts Library Services
_bASKH
_nAH30656405
938 _aEBSCOhost
_bEBSC
_n1261878
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis34514608
938 _aYBP Library Services
_bYANK
_n13057682
994 _a92
_bINOPJ
999 _c2803544
_d2803544