Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment
Sunil Cheruvu, Anil Kumar, David M. Wheeler, et al.
PDF
0,00 €
Amazon
iTunes
Thalia.de
Weltbild.de
Hugendubel
Bücher.de
ebook.de
kobo
Osiander
Google Books
Barnes&Noble
bol.com
Legimi
yourbook.shop
Kulturkaufhaus
* Affiliatelinks/Werbelinks
* Affiliatelinks/Werbelinks
Hinweis: Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Naturwissenschaften, Medizin, Informatik, Technik / Datenkommunikation, Netzwerke
Beschreibung
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.
What You'll Learn
- Secure devices, immunizing them against different threats originating from inside and outside the network
- Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms
- Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth
Who This Book Is For
Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
Weitere Titel von diesem Autor
Weitere Titel in dieser Kategorie
Kundenbewertungen
Schlagwörter
IoT Frameworks, Security, Architects, IoT, Strategists, Intel, Internet of Things, Open Access, Device connectivity, Software Security, Developers