LEADER 00000cam a2200721 i 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 190905s2020 nyua o 000 0 eng d 015 GBB9F7953|2bnb 016 7 019508473|2Uk 019 1121102044|a1125813105|a1136480904|a1138962421|a1295608843 |a1295872662|a1295990622|a1300489442|a1303288854 |a1303422912 020 9781484228968|q(electronic bk.) 020 1484228960|q(electronic bk.) 020 9781484228975|q(print) 020 1484228979 024 7 10.1007/978-1-4842-2896-8|2doi 029 1 AU@|b000066097368 029 1 UKMGB|b019508473 035 (OCoLC)1117469508|z(OCoLC)1121102044|z(OCoLC)1125813105 |z(OCoLC)1136480904|z(OCoLC)1138962421|z(OCoLC)1295608843 |z(OCoLC)1295872662|z(OCoLC)1295990622|z(OCoLC)1300489442 |z(OCoLC)1303288854|z(OCoLC)1303422912 037 com.springer.onix.9781484228968|bSpringer Nature 040 GW5XE|beng|erda|epn|cGW5XE|dUKMGB|dSFB|dCOO|dUKAHL|dVT2 |dOCLCF|dOCLCO|dDST|dOCLCO|dOCLCQ|dAAA|dOCLCQ|dOCLCO 049 INap 082 04 005.8 082 04 005.8|223 099 eBook O'Reilly for Public Libraries 100 1 Cheruvu, Sunil,|eauthor. 245 10 Demystifying Internet of Things security :|bsuccessful IoT device/edge and platform security deployment /|cSunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler.|h[O'Reilly electronic resource] 264 1 New York :|bApress,|c2020. 300 1 online resource (1 volume) :|billustrations (black and white, and color) 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file 347 |bPDF 505 0 Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. 506 Open access.|5GW5XE 520 Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Internet of things|xSecurity measures. 650 0 Computer networks. 650 0 Computer security. 650 2 Computer Communication Networks 650 2 Computer Security 650 6 Internet des objets|xSécurité|xMesures. 650 6 Réseaux d'ordinateurs. 650 6 Sécurité informatique. 650 6 Technologie de l'information. 650 7 information technology.|2aat 650 7 Computer security|2fast 650 7 Information technology|2fast 700 1 Kumar, Anil,|eauthor. 700 1 Smith, Ned,|eauthor. 700 1 Wheeler, David,|eauthor. 776 08 |iPrint version:|aCheruvu, Sunil.|tDemystifying Internet of Things security.|dNew York : Apress, 2019 |z9781484228951|w(OCoLC)1111295738 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781484228968/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH36710591 994 92|bJFN