Defending IoT infrastructures with the Raspberry Pi: monitoring and detecting nefarious behavior in real time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Apress
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484237007/?ar |
Zusammenfassung: | Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource |
ISBN: | 9781484237007 1484237005 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047608374 | ||
003 | DE-627-1 | ||
005 | 20240228120529.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781484237007 |c electronic bk. |9 978-1-4842-3700-7 | ||
020 | |a 1484237005 |c electronic bk. |9 1-4842-3700-5 | ||
035 | |a (DE-627-1)047608374 | ||
035 | |a (DE-599)KEP047608374 | ||
035 | |a (ORHE)9781484237007 | ||
035 | |a (DE-627-1)047608374 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.67/8 |2 23 | |
100 | 1 | |a Hosmer, Chet |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Defending IoT infrastructures with the Raspberry Pi |b monitoring and detecting nefarious behavior in real time |c Chet Hosmer |
264 | 1 | |a [Place of publication not identified] |b Apress |c 2018 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity. | ||
650 | 0 | |a Internet of things |x Security measures | |
650 | 0 | |a Raspberry Pi (Computer) | |
650 | 4 | |a Internet des objets ; Sécurité ; Mesures | |
650 | 4 | |a Raspberry Pi (Ordinateur) | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Raspberry Pi (Computer) | |
776 | 1 | |z 1484236998 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484236998 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484237007/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047608374 |
---|---|
_version_ | 1821494873402900480 |
adam_text | |
any_adam_object | |
author | Hosmer, Chet |
author_facet | Hosmer, Chet |
author_role | aut |
author_sort | Hosmer, Chet |
author_variant | c h ch |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047608374 (DE-599)KEP047608374 (ORHE)9781484237007 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03489cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047608374</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120529.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484237007</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-3700-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484237005</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-3700-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047608374</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047608374</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484237007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047608374</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hosmer, Chet</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defending IoT infrastructures with the Raspberry Pi</subfield><subfield code="b">monitoring and detecting nefarious behavior in real time</subfield><subfield code="c">Chet Hosmer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Raspberry Pi (Computer)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Raspberry Pi (Ordinateur)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Raspberry Pi (Computer)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484236998</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484236998</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484237007/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047608374 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:18Z |
institution | BVB |
isbn | 9781484237007 1484237005 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Hosmer, Chet VerfasserIn aut Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time Chet Hosmer [Place of publication not identified] Apress 2018 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity. Internet of things Security measures Raspberry Pi (Computer) Internet des objets ; Sécurité ; Mesures Raspberry Pi (Ordinateur) COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference 1484236998 Erscheint auch als Druck-Ausgabe 1484236998 |
spellingShingle | Hosmer, Chet Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time Internet of things Security measures Raspberry Pi (Computer) Internet des objets ; Sécurité ; Mesures Raspberry Pi (Ordinateur) COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
title | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time |
title_auth | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time |
title_exact_search | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time |
title_full | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time Chet Hosmer |
title_fullStr | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time Chet Hosmer |
title_full_unstemmed | Defending IoT infrastructures with the Raspberry Pi monitoring and detecting nefarious behavior in real time Chet Hosmer |
title_short | Defending IoT infrastructures with the Raspberry Pi |
title_sort | defending iot infrastructures with the raspberry pi monitoring and detecting nefarious behavior in real time |
title_sub | monitoring and detecting nefarious behavior in real time |
topic | Internet of things Security measures Raspberry Pi (Computer) Internet des objets ; Sécurité ; Mesures Raspberry Pi (Ordinateur) COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
topic_facet | Internet of things Security measures Raspberry Pi (Computer) Internet des objets ; Sécurité ; Mesures Raspberry Pi (Ordinateur) COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference |
work_keys_str_mv | AT hosmerchet defendingiotinfrastructureswiththeraspberrypimonitoringanddetectingnefariousbehaviorinrealtime |