Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

Annotation

Saved in:
Bibliographic Details
Main Authors: Russell, Brian, (Author), Van Duren, Drew, (Author)
Format: eBook
Language: English
Published: Birmingham, UK : Packt Publishing, [2016]
Series: Community experience distilled.
Subjects:
ISBN: 9781785880292
1785880292
9781785889639
178588963X
1523106263
9781523106264
Physical Description: 1 online resource : illustrations.

Cover

Table of contents

LEADER 05039cam a2200469 i 4500
001 kn-ocn953694676
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 160718t20162016enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d YDXCP  |d IDEBK  |d N$T  |d OCL  |d KSU  |d DEBSZ  |d TEFOD  |d DEBBG  |d C6I  |d LIP  |d OCLCQ  |d OCLCA  |d CEF  |d INT  |d OCLCQ  |d MQY  |d AGLDB  |d IGB  |d UKAHL  |d OCLCO  |d OCLCQ  |d QGK  |d OCLCO  |d OCLCL  |d OCLCQ 
020 |a 9781785880292  |q (electronic bk.) 
020 |a 1785880292  |q (electronic bk.) 
020 |z 9781785889639 
020 |z 178588963X 
020 |a 1523106263 
020 |a 9781523106264 
035 |a (OCoLC)953694676  |z (OCoLC)953054105  |z (OCoLC)1259222412 
100 1 |a Russell, Brian,  |e author. 
245 1 0 |a Practical internet of things security :  |b a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world /  |c Brian Russell, Drew Van Duren. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
500 |a Includes index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 8 |a Annotation  |b A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Internet of things. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Database management. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Van Duren, Drew,  |e author. 
776 0 8 |i Print version:  |z 178588963X  |z 9781785889639  |w (OCoLC)948336805 
830 0 |a Community experience distilled. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPITSAPIA/practical-internet-of?kpromoter=marc  |y Full text