Demystifying Internet of Things security: successful IoT device/edge and platform security deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
New York
Apress
2020
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781484228968/?ar |
Summary: | Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. |
Item Description: | Print version record |
Physical Description: | 1 online resource (1 volume) illustrations (black and white, and color) |
ISBN: | 9781484228968 1484228960 1484228979 |
Access: | Open access. |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-06075978X | ||
003 | DE-627-1 | ||
005 | 20240228120846.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201219s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781484228968 |c electronic bk. |9 978-1-4842-2896-8 | ||
020 | |a 1484228960 |c electronic bk. |9 1-4842-2896-0 | ||
020 | |a 1484228979 |9 1-4842-2897-9 | ||
035 | |a (DE-627-1)06075978X | ||
035 | |a (DE-599)KEP06075978X | ||
035 | |a (ORHE)9781484228968 | ||
035 | |a (DE-627-1)06075978X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a COM075000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Cheruvu, Sunil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Demystifying Internet of Things security |b successful IoT device/edge and platform security deployment |c Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
264 | 1 | |a New York |b Apress |c 2020 | |
300 | |a 1 online resource (1 volume) |b illustrations (black and white, and color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
506 | |a Open access. | ||
520 | |a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. | ||
650 | 0 | |a Internet of things |x Security measures | |
650 | 0 | |a Computer networks | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Communication Networks | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Internet des objets ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Technologie de l'information | |
650 | 4 | |a information technology | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology | |
700 | 1 | |a Kumar, Anil |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Ned |e VerfasserIn |4 aut | |
700 | 1 | |a Wheeler, David |e VerfasserIn |4 aut | |
776 | 1 | |z 9781484228951 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484228951 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484228968/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-06075978X |
---|---|
_version_ | 1833357042788597761 |
adam_text | |
any_adam_object | |
author | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David |
author_facet | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David |
author_role | aut aut aut aut |
author_sort | Cheruvu, Sunil |
author_variant | s c sc a k ak n s ns d w dw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)06075978X (DE-599)KEP06075978X (ORHE)9781484228968 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02997cam a22006012c 4500</leader><controlfield tag="001">ZDB-30-ORH-06075978X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120846.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201219s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484228968</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-2896-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228960</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-2896-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228979</subfield><subfield code="9">1-4842-2897-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06075978X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP06075978X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484228968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06075978X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UKN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM075000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cheruvu, Sunil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Demystifying Internet of Things security</subfield><subfield code="b">successful IoT device/edge and platform security deployment</subfield><subfield code="c">Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Apress</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations (black and white, and color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Anil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Ned</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wheeler, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484228951</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484228951</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484228968/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-06075978X |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:24Z |
institution | BVB |
isbn | 9781484228968 1484228960 1484228979 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations (black and white, and color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spelling | Cheruvu, Sunil VerfasserIn aut Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler New York Apress 2020 1 online resource (1 volume) illustrations (black and white, and color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record Open access. Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology Kumar, Anil VerfasserIn aut Smith, Ned VerfasserIn aut Wheeler, David VerfasserIn aut 9781484228951 Erscheint auch als Druck-Ausgabe 9781484228951 |
spellingShingle | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David Demystifying Internet of Things security successful IoT device/edge and platform security deployment Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
title | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_auth | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_exact_search | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_full | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_fullStr | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_full_unstemmed | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_short | Demystifying Internet of Things security |
title_sort | demystifying internet of things security successful iot device edge and platform security deployment |
title_sub | successful IoT device/edge and platform security deployment |
topic | Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
topic_facet | Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
work_keys_str_mv | AT cheruvusunil demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT kumaranil demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT smithned demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT wheelerdavid demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment |