Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment /

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...

Full description

Saved in:
Bibliographic Details
Main Authors: Cheruvu, Sunil (Author), Kumar, Anil (Author), Smith, Ned (Author), Wheeler, David M. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2020.
Edition:1st ed. 2020.
Subjects:
Online Access:Link to Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4842-2896-8
003 DE-He213
005 20240314162806.0
007 cr nn 008mamaa
008 190813s2020 xxu| s |||| 0|eng d
020 |a 9781484228968  |9 978-1-4842-2896-8 
024 7 |a 10.1007/978-1-4842-2896-8  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM043000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
100 1 |a Cheruvu, Sunil.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Demystifying Internet of Things Security  |h [electronic resource] :  |b Successful IoT Device/Edge and Platform Security Deployment /  |c by Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler. 
250 |a 1st ed. 2020. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2020. 
300 |a XXX, 488 p. 152 illus., 134 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. 
506 0 |a Open Access 
520 |a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. 
650 0 |a Computer networks . 
650 0 |a Data protection. 
650 0 |a Business information services. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Data and Information Security. 
650 2 4 |a IT in Business. 
700 1 |a Kumar, Anil.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Smith, Ned.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Wheeler, David M.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781484228951 
776 0 8 |i Printed edition:  |z 9781484228975 
776 0 8 |i Printed edition:  |z 9781484267295 
856 4 0 |u https://doi.org/10.1007/978-1-4842-2896-8  |z Link to Metadata 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
912 |a ZDB-2-SOB 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)