000 06517nam a22009615i 4500
001 9781501505775
003 DE-B1597
005 20240730161615.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 210830t20172017mau fo d z eng d
010 _a2016058712
019 _a(OCoLC)979836785
020 _a9781501505775
024 7 _a10.1515/9781501505775
_2doi
035 _a(DE-B1597)477966
035 _a(OCoLC)973762321
040 _aDE-B1597
_beng
_cDE-B1597
_erda
041 0 _aeng
044 _amau
_cUS-MA
050 0 0 _aTK5105.8857
_b.G55 2017
050 4 _aTK5105.8857
_b.G55 2017eb
072 7 _aCOM060040
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aGilchrist, Alasdair,
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_976806
245 1 0 _aIoT Security Issues /
_cAlasdair Gilchrist.
264 1 _aBoston ;
_aBerlin :
_bDe|G Press,
_c[2017]
264 4 _c©2017
300 _a1 online resource (XIV, 259 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 0 _tFrontmatter --
_tAcknowledgements --
_tContents --
_tIntroduction --
_tPart I: Making Sense of the Hype --
_tChapter 1 - The Consumer Internet of Things --
_tPart II: Security --
_tChapter 2 - It's Not Just About the Future --
_tChapter 3 - Flawed, Insecure Devices --
_tChapter 4 - Securing the Unidentified --
_tChapter 5 - Consumer Convenience Trumps Security --
_tChapter 6 - Startups Driving the IoT --
_tChapter 7 - Cyber-Security and the Customer Experience --
_tChapter 8 - Security Requirements for the IoT --
_tChapter 9 - Re-engineering the IoT --
_tChapter 10 - IoT Production, Security and Strength --
_tChapter 11 - Wearable's - A New Developer's Headache --
_tChapter 12 - New Surface Threats --
_tPart III: Architecting the Secure IoT --
_tChapter 13 - Designing the Secure IoT --
_tChapter 14 - Secure IoT Architecture Patterns --
_tChapter 15 - Threat Models --
_tPart IV: Defending the IoT --
_tChapter 16 - Threats, Vulnerabilities and Risks --
_tChapter 17 - IoT Security Framework --
_tChapter 18 - Secure IoT Design --
_tChapter 19 - Utilizing IPv6 Security Features --
_tPart V: Trust --
_tChapter 20 - The IoT of Trust --
_tChapter 21 - It's All About the Data --
_tChapter 22 - Trusting the Device --
_tChapter 23 - Who Can We Trust? --
_tPart VI: Privacy --
_tChapter 24 - Personal Private Information (PIP) --
_tChapter 25 - The U.S. and EU Data Privacy Shield --
_tPart VII: Surveillance, Subterfuge and Sabotage --
_tChapter 26 - The Panopticon --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aIoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aInternet of things.
_94027
650 4 _aIPv6 Security.
_976807
650 4 _aInternet of Things.
_94027
650 4 _aIoT.
_976808
650 4 _aNetzwerk.
_976809
650 4 _aSensoren.
_918818
650 4 _aSicherheit.
_976810
650 7 _aCOMPUTERS / Security / Online Safety & Privacy.
_2bisacsh
_976811
653 _aHacking.
653 _aIPv6.
653 _aInternet of Things.
653 _aIoT.
653 _aSensors.
653 _aVulnerabilities.
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Plus eBook-Package 2017
_z9783110719543
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2017
_z9783110540550
_oZDB-23-DGG
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE ENGLISH 2017
_z9783110625264
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2017
_z9783110547757
_oZDB-23-DEI
776 0 _cEPUB
_z9781501505621
776 0 _cprint
_z9781501514746
856 4 0 _uhttps://doi.org/10.1515/9781501505775
856 4 0 _uhttps://www.degruyter.com/isbn/9781501505775
856 4 2 _3Cover
_uhttps://www.degruyter.com/cover/covers/9781501505775.jpg
912 _a978-3-11-062526-4 EBOOK PACKAGE COMPLETE ENGLISH 2017
_b2017
912 _a978-3-11-071954-3 DG Plus eBook-Package 2017
_b2017
912 _aEBA_BACKALL
912 _aEBA_CL_CHCOMSGSEN
912 _aEBA_DGALL
912 _aEBA_EBACKALL
912 _aEBA_EBKALL
912 _aEBA_ECL_CHCOMSGSEN
912 _aEBA_EEBKALL
912 _aEBA_ESTMALL
912 _aEBA_STMALL
912 _aGBV-deGruyter-alles
912 _aPDA12STME
912 _aPDA13ENGE
912 _aPDA18STMEE
912 _aPDA5EBK
912 _aZDB-23-DEI
_b2017
912 _aZDB-23-DGG
_b2017
942 _cEBK
999 _c84482
_d84482