000922494 000__ 03017cam\a2200469Ii\4500 000922494 001__ 922494 000922494 005__ 20230306150838.0 000922494 006__ m\\\\\o\\d\\\\\\\\ 000922494 007__ cr\cn\nnnunnun 000922494 008__ 190905s2020\\\\nyua\\\\o\\\\\000\0\eng\d 000922494 019__ $$a1121102044$$a1125813105$$a1136480904 000922494 020__ $$a9781484228968$$q(electronic book) 000922494 020__ $$a1484228960$$q(electronic book) 000922494 020__ $$z9781484228951 000922494 020__ $$z1484228952 000922494 0247_ $$a10.1007/978-1-4842-2896-8$$2doi 000922494 035__ $$aSP(OCoLC)on1117469508 000922494 035__ $$aSP(OCoLC)1117469508$$z(OCoLC)1121102044$$z(OCoLC)1125813105$$z(OCoLC)1136480904 000922494 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dSFB$$dCOO 000922494 049__ $$aISEA 000922494 050_4 $$aTK5105.8857 000922494 08204 $$a005.8$$223 000922494 1001_ $$aCheruvu, Sunil,$$eauthor. 000922494 24510 $$aDemystifying Internet of Things security :$$bsuccessful IoT device/edge and platform security deployment /$$cSunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler. 000922494 264_1 $$aNew York :$$bApress,$$c2020. 000922494 300__ $$a1 online resource :$$billustrations. 000922494 336__ $$atext$$btxt$$2rdacontent 000922494 337__ $$acomputer$$bc$$2rdamedia 000922494 338__ $$aonline resource$$bcr$$2rdacarrier 000922494 5050_ $$aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. 000922494 506__ $$aAccess limited to authorized users. 000922494 520__ $$aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. 000922494 588__ $$aDescription based on print version record. 000922494 650_0 $$aInternet of things$$xSecurity measures. 000922494 7001_ $$aKumar, Anil,$$eauthor. 000922494 7001_ $$aSmith, Ned,$$eauthor. 000922494 7001_ $$aWheeler, David,$$eauthor. 000922494 77608 $$iPrint version:$$aCheruvu, Sunil.$$tDemystifying Internet of Things security.$$dNew York : Apress, 2019$$z9781484228951$$w(OCoLC)1111295738 000922494 852__ $$bebk 000922494 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-2896-8$$zOnline Access$$91397441.1 000922494 909CO $$ooai:library.usi.edu:922494$$pGLOBAL_SET 000922494 980__ $$aEBOOK 000922494 980__ $$aBIB 000922494 982__ $$aEbook 000922494 983__ $$aOnline 000922494 994__ $$a92$$bISE