Cantitate/Preț
Produs

The IoT Architect's Guide to Attainable Security and Privacy

Autor Damilare D. Fagbemi, David Wheeler, JC Wheeler
en Limba Engleză Hardback – 4 oct 2019
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.
"Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel
'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies
'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express
"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 25009 lei  6-8 săpt.
  CRC Press – 29 mar 2023 25009 lei  6-8 săpt.
Hardback (1) 34564 lei  6-8 săpt.
  CRC Press – 4 oct 2019 34564 lei  6-8 săpt.

Preț: 34564 lei

Preț vechi: 49816 lei
-31% Nou

Puncte Express: 518

Preț estimativ în valută:
6615 6979$ 5513£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780815368168
ISBN-10: 081536816X
Pagini: 330
Dimensiuni: 178 x 254 x 23 mm
Greutate: 0.75 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications

Public țintă

General and Professional Practice & Development

Cuprins

Dedication
Contents
Foreword by Dr. James Ransome
Foreword by Erv Comer
Preface
Acknowledgments
About the Authors
Part One
Chapter 1 How We Got Here
Damilare Fagbemi, Dave Wheeler, and JC Wheeler
Chapter 2 The IoT Castle and Its Many Gates
Damilare Fagbemi and Dave Wheeler
Chapter 3 The IoT Security Economy
Damilare Fagbemi and Dave Wheeler
Part Two
Chapter 4 Architecting IoT Systems That Scale Securely
Dave Wheeler
Chapter 5 Security Architecture for Real IoT Systems
Dave Wheeler
Chapter 6 Securing the IoT Cloud
Damilare Fagbemi
Chapter 7 Securely Connecting the Unconnected
Dave Wheeler
Chapter 8 Privacy, Pirates, and the Tale of a Smart City
JC Wheeler
Chapter 9 Privacy Controls in an Age of Ultra-Connectedness
Dave Wheeler and Damilare Fagbemi
Chapter 10 Security Usability: Human, Computer, and Security Interaction
Damilare Fagbemi
Part Three
Chapter 11 Earth 2040—Peeking at the Future
Damilare Fagbemi
Epilogue
Index

Notă biografică

Damilare D. Fagbemi, David Wheeler, JC Wheeler

Descriere

This book explores how to secure the future state of the Internet of Things. Looking at an imminent future filled with computers that also moonlight as "things", the guide dissect the present and future threats to assets, digital and other wise. To avoid the significant technical debt which is likely to manifest as IoT adoption increases, it’s important to think ahead. To that effect, the book examines how to design IoT solutions that provide end-to-end security and privacy at scale, delves into IoT economy from the perspective of both defenders and attackers, and discusses the implications of security usability.