001472121 000__ 04712cam\\2200613\i\4500 001472121 001__ 1472121 001472121 003__ OCoLC 001472121 005__ 20230908003331.0 001472121 006__ m\\\\\o\\d\\\\\\\\ 001472121 007__ cr\un\nnnunnun 001472121 008__ 230730s2023\\\\caua\\\\o\\\\\001\0\eng\d 001472121 020__ $$a9781484282977$$q(electronic bk.) 001472121 020__ $$a1484282973$$q(electronic bk.) 001472121 020__ $$z9781484282960 001472121 020__ $$z1484282965 001472121 0247_ $$a10.1007/978-1-4842-8297-7$$2doi 001472121 035__ $$aSP(OCoLC)1391435423 001472121 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP 001472121 049__ $$aISEA 001472121 050_4 $$aQA76.9.A25 001472121 08204 $$a005.8$$223/eng/20230802 001472121 1001_ $$aBooth, Jody,$$eauthor. 001472121 24510 $$aDemystifying intelligent multimode security systems:$$ban edge-to-cloud cybersecurity solutions guide /$$cJody Booth, Dr. Werner Metz, PhD, Dr. Anahit Tarkhanyan, PhD, Sunil Cheruvu. 001472121 264_1 $$a[Berkeley] :$$bApress,$$c[2023] 001472121 264_4 $$c©2023 001472121 300__ $$a1 online resource (xix, 280 pages) :$$billustrations 001472121 336__ $$atext$$btxt$$2rdacontent 001472121 337__ $$acomputer$$bc$$2rdamedia 001472121 338__ $$aonline resource$$bcr$$2rdacarrier 001472121 500__ $$aIncludes index. 001472121 5050_ $$aIntroduction -- Chapter 1: Introduction and Overview -- Chapter 2: Architecting an E2E IMSS Data Pipeline -- Chapter 3: Architecting an E2E DSS Data Pipeline -- Chapter 4: Securing the IMSS Assets -- Chapter 5: Machine Learning Security -- Chapter 6: Sample Applications -- Chapter 7: Looking Into the Future -- Chapter 8: As We Go To Press. 001472121 506__ $$aAccess limited to authorized users. 001472121 520__ $$aUse this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS. Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment. 001472121 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 2, 2023). 001472121 650_0 $$aComputer security. 001472121 655_0 $$aElectronic books. 001472121 7001_ $$aMetz, Werner,$$eauthor. 001472121 7001_ $$aTarkhanyan, Anahit,$$eauthor. 001472121 7001_ $$aCheruvu, Sunil,$$eauthor. 001472121 77608 $$iPrint version:$$z1484282965$$z9781484282960$$w(OCoLC)1317840810 001472121 852__ $$bebk 001472121 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-8297-7$$zOnline Access$$91397441.1 001472121 909CO $$ooai:library.usi.edu:1472121$$pGLOBAL_SET 001472121 980__ $$aBIB 001472121 980__ $$aEBOOK 001472121 982__ $$aEbook 001472121 983__ $$aOnline 001472121 994__ $$a92$$bISE