001433700 000__ 04287cam\a2200577\i\4500 001433700 001__ 1433700 001433700 003__ OCoLC 001433700 005__ 20230309003649.0 001433700 006__ m\\\\\o\\d\\\\\\\\ 001433700 007__ cr\cn\nnnunnun 001433700 008__ 210206s2021\\\\si\a\\\\ob\\\\000\0\eng\d 001433700 019__ $$a1235762541$$a1241065932$$a1249943496$$a1264727142 001433700 020__ $$a9811599424$$q(electronic book) 001433700 020__ $$a9789811599422$$q(electronic bk.) 001433700 020__ $$z9811599416$$q(hardcover) 001433700 020__ $$z9789811599415$$q(hardcover) 001433700 0247_ $$a10.1007/978-981-15-9942-2$$2doi 001433700 035__ $$aSP(OCoLC)1236261208 001433700 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCO$$dYDX$$dDKU$$dZ5A$$dLEATE$$dN$T$$dUKAHL$$dSNK$$dOCLCQ$$dOCLCO$$dOCLCQ 001433700 049__ $$aISEA 001433700 050_4 $$aTK5105.8857$$b.T35 2021 001433700 08204 $$a005.8$$223 001433700 1001_ $$aTang, Qinghao,$$eauthor. 001433700 24510 $$aInternet of things security :$$bprinciples and practice /$$cQinghao Tang, Fan Du. 001433700 264_1 $$aSingapore :$$bSpringer,$$c[2021] 001433700 300__ $$a1 online resource 001433700 336__ $$atext$$btxt$$2rdacontent 001433700 337__ $$acomputer$$bc$$2rdamedia 001433700 338__ $$aonline resource$$bcr$$2rdacarrier 001433700 347__ $$atext file 001433700 347__ $$bPDF 001433700 504__ $$aIncludes bibliographical references. 001433700 5050_ $$aPart 1 Basics and analysis methods for IoT System -- 1 The Analysis on Hardware -- 2 The Analysis on Wireless Communication -- 3 Basic Knowledge of Firmware -- 4 Analysis of Firmware Vulnerabilities -- Part 2 Defense methods for Industrial IoT System -- 5 Techniques for IoT Security -- 6 Solutions for IoT System Security. 001433700 506__ $$aAccess limited to authorized users. 001433700 520__ $$aOver the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks, Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they shared let the public become more aware of IoT device security-related risks. Currently, many IoT product suppliers have begun hiring equipment evaluation services and purchasing security protection products. As a direct participant in the IoT ecological security research project, I would like to introduce the book to anyone who is a beginner that is willing to start the IoT journey, practitioners in the IoT ecosystem, and practitioners in the security industry. This book provides beginners with key theories and methods for IoT device penetration testing; explains various tools and techniques for hardware, firmware and wireless protocol analysis; and explains how to design a secure IoT device system, while providing relevant code details. 001433700 588__ $$aOnline resource; title from digital title page (viewed on May 24, 2021). 001433700 650_0 $$aInternet of things$$xSecurity measures. 001433700 650_0 $$aComputer security. 001433700 650_0 $$aData encryption (Computer science) 001433700 650_6 $$aInternet des objets$$xSécurité$$xMesures. 001433700 650_6 $$aSécurité informatique. 001433700 650_6 $$aChiffrement (Informatique) 001433700 655_0 $$aElectronic books. 001433700 7001_ $$aDu, Fan,$$eauthor. 001433700 77608 $$iPrint version:$$z9789811599415 001433700 852__ $$bebk 001433700 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-15-9942-2$$zOnline Access$$91397441.1 001433700 909CO $$ooai:library.usi.edu:1433700$$pGLOBAL_SET 001433700 980__ $$aBIB 001433700 980__ $$aEBOOK 001433700 982__ $$aEbook 001433700 983__ $$aOnline 001433700 994__ $$a92$$bISE