Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler.
2020
TK5105.8857
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler.
Author
Cheruvu, Sunil, author.
ISBN
9781484228968 (electronic book)
1484228960 (electronic book)
9781484228951
1484228952
1484228960 (electronic book)
9781484228951
1484228952
Published
New York : Apress, 2020.
Language
English
Description
1 online resource : illustrations.
Item Number
10.1007/978-1-4842-2896-8 doi
Call Number
TK5105.8857
Dewey Decimal Classification
005.8
Summary
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.
Access Note
Access limited to authorized users.
Source of Description
Description based on print version record.
Available in Other Form
Demystifying Internet of Things security.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1: Conceptualizing the Internet of Things
Chapter 2: IoT Frameworks and Complexity Hiding
Chapter 3: Base Platform Security Hardware Building Blocks
Chapter 4: IoT Software Security Building Blocks
Chapter 5: Connectivity Technologies for IoT
Chapter 6: IoT Vertical Applications and Associated Security Requirements.
Chapter 2: IoT Frameworks and Complexity Hiding
Chapter 3: Base Platform Security Hardware Building Blocks
Chapter 4: IoT Software Security Building Blocks
Chapter 5: Connectivity Technologies for IoT
Chapter 6: IoT Vertical Applications and Associated Security Requirements.