|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
KNOVEL_on1050953358 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180906s2018 enka o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d STF
|d TEFOD
|d CEF
|d N$T
|d G3B
|d EBLCP
|d MERUC
|d UAB
|d OCLCQ
|d UX1
|d K6U
|d NLW
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1175634058
|
020 |
|
|
|a 9781788830850
|q (electronic bk.)
|
020 |
|
|
|a 1788830857
|q (electronic bk.)
|
020 |
|
|
|z 9781788832687
|
020 |
|
|
|a 178883268X
|q (Trade Paper)
|
020 |
|
|
|a 9781788832687
|
024 |
3 |
|
|a 9781788832687
|
029 |
1 |
|
|a AU@
|b 000066202941
|
035 |
|
|
|a (OCoLC)1050953358
|z (OCoLC)1175634058
|
037 |
|
|
|a CL0500000989
|b Safari Books Online
|
037 |
|
|
|a 4EB0E585-0C88-41A5-A3E9-93FAA19281F8
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.8857
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.678
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bhattacharjee, Sravani,
|e author.
|
245 |
1 |
0 |
|a Practical Industrial Internet of Things security :
|b a practitioner's guide to securing connected industries /
|c Sravani Bhattacharjee.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed November 14, 2018)
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Disclaimer; Table of Contents; Preface; Chapter 1: An Unprecedented Opportunity at Stake; Defining the Industrial IoT; Industrial IoT, Industrial Internet, and Industrie 4.0; Consumer versus Industrial IoT; Industrial IoT security-a business imperative; Cybersecurity versus cyber-physical IoT security; What is a cyber-physical system?; Industrial ""things, "" connectivity, and operational technologies; Operational technology; Machine-to-Machine; An overview of SCADA, DCS, and PLC
|
505 |
8 |
|
|a Industrial control system architectureICS components and data networks; ICS network components; Fieldbus protocols; IT and OT convergence -what it really means; Industrial IoT deployment architecture; Divergence in IT and OT security fundamentals; Operational priorities; Attack surface and threat actors; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats and threat actors; Vulnerabilities; Policy and procedure vulnerabilities; Platform vulnerabilities; Software platform vulnerabilities; Network vulnerability; Risks
|
505 |
8 |
|
|a Evolution of cyber-physical attacksIndustrial IoT use cases -examining the cyber risk gap; Energy and smart grids; Manufacturing; Cyberattack on industrial control systems-Stuxnet case study; Event flow; Key points; Risk gap summary; Smart city and autonomous transportation; Healthcare and pharmaceuticals; The ransomware attack on the healthcare enterprise-""WannaCry"" case study; Cyber risk gap summary; Summary; Chapter 2: Industrial IoT Dataflow and Security Architecture; Primer on IIoT attacks and countermeasures; Attack surfaces and attack vectors; OWASP IoT attack surfaces
|
505 |
8 |
|
|a Attack treesFault tree analysis; Threat modeling; STRIDE threat model; DREAD threat model; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security architecture; Business viewpoint; Usage viewpoint; Functional viewpoint; Implementation viewpoint; IIoT architecture patterns; Pattern 1 -- Three-tier architectural model; Pattern 2- Layered databus architecture; Building blocks of industrial IoT security architecture; A four-tier IIoT security model; Summary; Chapter 3: IIoT Identity and Access Management; A primer on identity and access control
|
505 |
8 |
|
|a IdentificationAuthentication; Authorization; Account management; Distinguishing features of IAM in IIoT; Diversity of IIoT endpoints; Resource-constrained and brownfield considerations; Physical safety and reliability; Autonomy and scalability; Event logging is a rarity; Subscription-based models; Increasing sophistication of identity attacks; Risk-based access control policy; Identity management across the device lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics; Multi-factor authentication; Key-based authentication; Symmetric keys
|
520 |
|
|
|a This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Management.
|
650 |
|
6 |
|a Internet des objets
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Entreprises
|x Réseaux d'ordinateurs
|x Gestion.
|
650 |
|
7 |
|a Portable & handheld devices: consumer/user guides.
|2 bicssc
|
650 |
|
7 |
|a Mobile phones: consumer/user guides.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Computer hardware.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Management
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpPIITS002/toc
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5495617
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1860858
|
994 |
|
|
|a 92
|b IZTAP
|