000 | 06517nam a22009615i 4500 | ||
---|---|---|---|
001 | 9781501505775 | ||
003 | DE-B1597 | ||
005 | 20240730161615.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 210830t20172017mau fo d z eng d | ||
010 | _a2016058712 | ||
019 | _a(OCoLC)979836785 | ||
020 | _a9781501505775 | ||
024 | 7 |
_a10.1515/9781501505775 _2doi |
|
035 | _a(DE-B1597)477966 | ||
035 | _a(OCoLC)973762321 | ||
040 |
_aDE-B1597 _beng _cDE-B1597 _erda |
||
041 | 0 | _aeng | |
044 |
_amau _cUS-MA |
||
050 | 0 | 0 |
_aTK5105.8857 _b.G55 2017 |
050 | 4 |
_aTK5105.8857 _b.G55 2017eb |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aGilchrist, Alasdair, _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _976806 |
|
245 | 1 | 0 |
_aIoT Security Issues / _cAlasdair Gilchrist. |
264 | 1 |
_aBoston ; _aBerlin : _bDe|G Press, _c[2017] |
|
264 | 4 | _c©2017 | |
300 | _a1 online resource (XIV, 259 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | 0 |
_tFrontmatter -- _tAcknowledgements -- _tContents -- _tIntroduction -- _tPart I: Making Sense of the Hype -- _tChapter 1 - The Consumer Internet of Things -- _tPart II: Security -- _tChapter 2 - It's Not Just About the Future -- _tChapter 3 - Flawed, Insecure Devices -- _tChapter 4 - Securing the Unidentified -- _tChapter 5 - Consumer Convenience Trumps Security -- _tChapter 6 - Startups Driving the IoT -- _tChapter 7 - Cyber-Security and the Customer Experience -- _tChapter 8 - Security Requirements for the IoT -- _tChapter 9 - Re-engineering the IoT -- _tChapter 10 - IoT Production, Security and Strength -- _tChapter 11 - Wearable's - A New Developer's Headache -- _tChapter 12 - New Surface Threats -- _tPart III: Architecting the Secure IoT -- _tChapter 13 - Designing the Secure IoT -- _tChapter 14 - Secure IoT Architecture Patterns -- _tChapter 15 - Threat Models -- _tPart IV: Defending the IoT -- _tChapter 16 - Threats, Vulnerabilities and Risks -- _tChapter 17 - IoT Security Framework -- _tChapter 18 - Secure IoT Design -- _tChapter 19 - Utilizing IPv6 Security Features -- _tPart V: Trust -- _tChapter 20 - The IoT of Trust -- _tChapter 21 - It's All About the Data -- _tChapter 22 - Trusting the Device -- _tChapter 23 - Who Can We Trust? -- _tPart VI: Privacy -- _tChapter 24 - Personal Private Information (PIP) -- _tChapter 25 - The U.S. and EU Data Privacy Shield -- _tPart VII: Surveillance, Subterfuge and Sabotage -- _tChapter 26 - The Panopticon -- _tIndex |
506 | 0 |
_arestricted access _uhttp://purl.org/coar/access_right/c_16ec _fonline access with authorization _2star |
|
520 | _aIoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields. | ||
538 | _aMode of access: Internet via World Wide Web. | ||
546 | _aIn English. | ||
588 | 0 | _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) | |
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aInternet of things. _94027 |
|
650 | 4 |
_aIPv6 Security. _976807 |
|
650 | 4 |
_aInternet of Things. _94027 |
|
650 | 4 |
_aIoT. _976808 |
|
650 | 4 |
_aNetzwerk. _976809 |
|
650 | 4 |
_aSensoren. _918818 |
|
650 | 4 |
_aSicherheit. _976810 |
|
650 | 7 |
_aCOMPUTERS / Security / Online Safety & Privacy. _2bisacsh _976811 |
|
653 | _aHacking. | ||
653 | _aIPv6. | ||
653 | _aInternet of Things. | ||
653 | _aIoT. | ||
653 | _aSensors. | ||
653 | _aVulnerabilities. | ||
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDG Plus eBook-Package 2017 _z9783110719543 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE 2017 _z9783110540550 _oZDB-23-DGG |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE ENGLISH 2017 _z9783110625264 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE Engineering, Computer Sciences 2017 _z9783110547757 _oZDB-23-DEI |
776 | 0 |
_cEPUB _z9781501505621 |
|
776 | 0 |
_cprint _z9781501514746 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1515/9781501505775 |
856 | 4 | 0 | _uhttps://www.degruyter.com/isbn/9781501505775 |
856 | 4 | 2 |
_3Cover _uhttps://www.degruyter.com/cover/covers/9781501505775.jpg |
912 |
_a978-3-11-062526-4 EBOOK PACKAGE COMPLETE ENGLISH 2017 _b2017 |
||
912 |
_a978-3-11-071954-3 DG Plus eBook-Package 2017 _b2017 |
||
912 | _aEBA_BACKALL | ||
912 | _aEBA_CL_CHCOMSGSEN | ||
912 | _aEBA_DGALL | ||
912 | _aEBA_EBACKALL | ||
912 | _aEBA_EBKALL | ||
912 | _aEBA_ECL_CHCOMSGSEN | ||
912 | _aEBA_EEBKALL | ||
912 | _aEBA_ESTMALL | ||
912 | _aEBA_STMALL | ||
912 | _aGBV-deGruyter-alles | ||
912 | _aPDA12STME | ||
912 | _aPDA13ENGE | ||
912 | _aPDA18STMEE | ||
912 | _aPDA5EBK | ||
912 |
_aZDB-23-DEI _b2017 |
||
912 |
_aZDB-23-DGG _b2017 |
||
942 | _cEBK | ||
999 |
_c84482 _d84482 |