Demystifying Internet of Things security: successful IoT device/edge and platform security deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
Apress
2020
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484228968/?ar |
Zusammenfassung: | Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations (black and white, and color) |
ISBN: | 9781484228968 1484228960 1484228979 |
Zugangsbedingungen: | Open access. |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-06075978X | ||
003 | DE-627-1 | ||
005 | 20240228120846.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201219s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781484228968 |c electronic bk. |9 978-1-4842-2896-8 | ||
020 | |a 1484228960 |c electronic bk. |9 1-4842-2896-0 | ||
020 | |a 1484228979 |9 1-4842-2897-9 | ||
035 | |a (DE-627-1)06075978X | ||
035 | |a (DE-599)KEP06075978X | ||
035 | |a (ORHE)9781484228968 | ||
035 | |a (DE-627-1)06075978X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a COM075000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Cheruvu, Sunil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Demystifying Internet of Things security |b successful IoT device/edge and platform security deployment |c Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
264 | 1 | |a New York |b Apress |c 2020 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations (black and white, and color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
506 | |a Open access. | ||
520 | |a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. | ||
650 | 0 | |a Internet of things |x Security measures | |
650 | 0 | |a Computer networks | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Communication Networks | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Internet des objets ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Technologie de l'information | |
650 | 4 | |a information technology | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology | |
700 | 1 | |a Kumar, Anil |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Ned |e VerfasserIn |4 aut | |
700 | 1 | |a Wheeler, David |e VerfasserIn |4 aut | |
776 | 1 | |z 9781484228951 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484228951 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484228968/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-06075978X |
---|---|
_version_ | 1821494835367903233 |
adam_text | |
any_adam_object | |
author | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David |
author_facet | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David |
author_role | aut aut aut aut |
author_sort | Cheruvu, Sunil |
author_variant | s c sc a k ak n s ns d w dw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)06075978X (DE-599)KEP06075978X (ORHE)9781484228968 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02998cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-06075978X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120846.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201219s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484228968</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-2896-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228960</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-2896-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484228979</subfield><subfield code="9">1-4842-2897-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06075978X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP06075978X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484228968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)06075978X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UKN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM075000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cheruvu, Sunil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Demystifying Internet of Things security</subfield><subfield code="b">successful IoT device/edge and platform security deployment</subfield><subfield code="c">Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Apress</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations (black and white, and color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet des objets ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Anil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Ned</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wheeler, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484228951</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484228951</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484228968/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-06075978X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:41Z |
institution | BVB |
isbn | 9781484228968 1484228960 1484228979 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations (black and white, and color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spelling | Cheruvu, Sunil VerfasserIn aut Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler New York Apress 2020 1 Online-Ressource (1 volume) illustrations (black and white, and color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record Open access. Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology Kumar, Anil VerfasserIn aut Smith, Ned VerfasserIn aut Wheeler, David VerfasserIn aut 9781484228951 Erscheint auch als Druck-Ausgabe 9781484228951 |
spellingShingle | Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David Demystifying Internet of Things security successful IoT device/edge and platform security deployment Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
title | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_auth | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_exact_search | Demystifying Internet of Things security successful IoT device/edge and platform security deployment |
title_full | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_fullStr | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_full_unstemmed | Demystifying Internet of Things security successful IoT device/edge and platform security deployment Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler |
title_short | Demystifying Internet of Things security |
title_sort | demystifying internet of things security successful iot device edge and platform security deployment |
title_sub | successful IoT device/edge and platform security deployment |
topic | Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
topic_facet | Internet of things Security measures Computer networks Computer security Computer Communication Networks Computer Security Internet des objets ; Sécurité ; Mesures Réseaux d'ordinateurs Sécurité informatique Technologie de l'information information technology Information technology |
work_keys_str_mv | AT cheruvusunil demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT kumaranil demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT smithned demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment AT wheelerdavid demystifyinginternetofthingssecuritysuccessfuliotdeviceedgeandplatformsecuritydeployment |