Practical Internet of Things Security (notice n° 65859)

détails MARC
000 -LEADER
fixed length control field 04136cam a2200289zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88843267
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250107220259.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250107s2016 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781785889639
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88843267
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Russell, Brian
245 01 - TITLE STATEMENT
Title Practical Internet of Things Security
Statement of responsibility, etc. ['Russell, Brian', 'Duren, Drew Van']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Packt Publishing
Date of production, publication, distribution, manufacture, or copyright notice 2016
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldAbout This BookLearn to design and implement cyber security strategies for your organizationLearn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystemLearn best practices to secure your data from device to the cloudGain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.What You Will LearnLearn how to break down cross-industry barriers by adopting the best practices for IoT deploymentsBuild a rock-solid security program for IoT that is cost-effective and easy to maintainDemystify complex topics such as cryptography, privacy, and penetration testing to improve your security postureSee how the selection of individual components can affect the security posture of the entire systemUse Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystemGet to know how to leverage the burdgening cloud-based systems that will support the IoT into the future.In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.Style and approachThis book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Russell, Brian
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Duren, Drew Van
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88843267">https://international.scholarvox.com/netsen/book/88843267</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025