|
|
|
|
LEADER |
00000nam a2200000 i 4500 |
001 |
MGH_AEACE21102003 |
003 |
IN-ChSCO |
005 |
20211020125402.0 |
006 |
m||||||||||||||||| |
007 |
cr |n||||||||n |
008 |
211020s2021||||nyu|||||o|||||||||||eng|| |
010 |
|
|
|z 2021938433
|
020 |
|
|
|a 9781260463101 (e-ISBN)
|
020 |
|
|
|a 1260463109 (e-ISBN)
|
020 |
|
|
|a 9781260463095 (print-ISBN)
|
020 |
|
|
|a 1260463095 (print-ISBN)
|
035 |
|
|
|a (OCoLC)1277047947
|
040 |
|
|
|a IN-ChSCO
|b eng
|e rda
|
041 |
0 |
|
|a eng
|
050 |
|
4 |
|a TK5105.8857
|
072 |
|
7 |
|a TEC
|x 007000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Arora, Sumeet,
|e author.
|
245 |
1 |
0 |
|a Design of Secure IoT Systems :
|b A Practical Approach Across Industries /
|c Sumeet Arora, Ramachandra Gambheer, Meenakshi Vohra.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York, N.Y. :
|b McGraw-Hill Education,
|c [2021]
|
264 |
|
4 |
|c ?2021
|
300 |
|
|
|a 1 online resource (224 pages) :
|b illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- 1 Evolution of IoT -- 1.1 Introduction to Digital Transformation -- 1.2 Connected Value Chain -- 1.3 What Is Digital Transformation? -- 1.4 Introduction to IoT -- 1.5 Building Blocks of IoT System -- 1.6 Evolution of IoT -- 1.7 Connected Vehicle Use Case -- 1.8 Chapters Overview -- 2 IoT Architecture and Technology Essentials -- 2.1 Introduction -- 2.2 IoT System Architecture -- 2.3 IoT Technology and Protocols -- 2.4 Applying Learnings to Connected Vehicle Use Case -- 2.5 Conclusion -- 3 Connected Machines -- 3.1 Introduction -- 3.2 Machine-to-Machine (M2M) Segments -- 3.3 M2M Communication -- 3.4 Applications of M2M -- 3.5 Key Features of M2M -- 3.6 Architecture and Components of M2M -- 3.7 M2M Application Communication Principles -- 3.8 Issues/Concerns in M2M -- 3.9 Standardization Efforts for M2M -- 3.10 Conclusion -- 4 Network Architecture for IoT -- 4.1 Introduction -- 4.2 Network Terminology -- 4.3 ISO-OSI Reference Model -- 4.4 Network Protocols -- 4.5 WAN Architecture -- 4.6 MAC Source Address -- 4.7 Data Reception -- 4.8 Multiprotocol Label Switching -- 4.9 Data Center -- 4.10 Data Center Networking -- 4.11 IoT Gateways -- 4.12 Conclusion -- 5 IoT Hardware Design Fundamentals -- 5.1 Introduction -- 5.2 Hardware System Requirements -- 5.3 Hardware Functional Specifications -- 5.4 Software Functional Specifications -- 5.5 Hardware Component Selection -- 5.6 Design for Manufacturability -- 5.7 Design for Testability -- 5.8 Schematics, Layout, and Gerbers -- 5.9 PCB Fabrication and Assembly -- 5.10 Summarizing HW Design Flow -- 5.11 Applying Learnings to Connected Vehicle Use Case -- 5.12 Examples of Commercially Available IoT Devices -- 5.13 Standards Used in HW Component Configurations -- 5.14 Selection of Network Hardware for IoT Applications -- 5.15 IoT Hardware Security -- 5.16 Conclusion -- 6 IoT Data Systems Design -- 6.1 Introduction -- 6.2 IoT Data System -- 6.3 Value Chain Activity Generates Data -- 6.4 Operational Data: Sensors and Devices -- 6.5 Business and Customer/User Data -- 6.6 Intersection of Operational Data and Business Data -- 6.7 Structured and Unstructured Data -- 6.8 Data Systems Design -- 6.9 Data Transport -- 6.10 Data Collection -- 6.11 Data Storage -- 6.12 Data Preparation -- 6.13 Organizing Data for Analytics -- 6.14 Data Lake, Data Warehouses, and Efficient Access to Data -- 6.15 Analytics and Business Intelligence -- 6.16 Data Science and IoT -- 6.17 Machine Learning -- 6.18 Putting It Together to Build an IoT Data System -- 6.19 Applying Learnings to Connected Vehicle Use Case -- 6.20 Conclusion -- 7 IoT: Designing with Trust and Security -- 7.1 Introduction -- 7.2 Need for a Secure IoT System -- 7.3 Requirements for Secure IoT System -- 7.4 IoT Device Security -- 7.5 Trusted IoT Device -- 7.6 Trusted Device Identity -- 7.7 IoT Device Secure Storage -- 7.8 Secure Boot and Trusted Execution Environment -- 7.9 Secure Root of Trust -- 7.10 Trustworthy Firmware and Software -- 7.11 Public Key Infrastructure -- 7.12 Trusted Supply Chain -- 7.13 Secure Random Number Generator -- 7.14 IoT D2X (Device to X) Communication Security -- 7.15 Mutually Authenticated Endpoints -- 7.16 Secure Communication Channel and End-to-End Message Integrity -- 7.17 Secure Monitoring Systems -- 7.18 IoT Device to Cloud Security -- 7.19 IoT Data Security Policies and Regulations -- 7.20 IoT Trusted Platform -- 7.21 Secure Authentication -- 7.22 End-to-End Security (Including Third Parties) -- 7.23 Applying Learnings to Connected Vehicle Use Case -- 7.24 Conclusion -- Appendix: IoT Cybersecurity Threats and Risks Review Sample -- 8 Automation -- 8.1 Introduction -- 8.2 IoT Device Life Cycle Management -- 8.3 Zero Touch IoT Devices -- 8.4 Plug and Play IoT Devices -- 8.5 IoT SIM Cards and Management -- 8.6 Commercially Available IoT Control Software -- 8.7 Secure Automation of IoT Network Infrastructure -- 8.8 IoT Application Software Design Principles -- 8.9 Cloud Native Software -- 8.10 Automation of Value Chain Workflows -- 8.11 Edge Computing and Cloud Computing -- 8.12 Applying Learnings to Connected Vehicle Use Case -- 8.13 Conclusion -- 9 IoT Use Cases Across Industries -- 9.1 Introduction -- 9.2 Manufacturing Sector -- 9.3 Connected Vehicles -- 9.4 Seaport Automation -- 9.5 Airport Automation -- 9.6 Drones for Medical/Healthcare Systems -- 9.7 IoT Application in Oil and Natural Gas Industry -- 9.8 Conclusion -- 10 IoT Use Case Exercises -- 10.1 Banking Sector/Bank of Things -- 10.2 Agriculture?Agri of Things -- 10.3 Enhanced Smart Home (Home Automation) -- 10.4 Smart Manufacturing -- 10.5 Internet of Medical Things (IoMT) -- 10.6 Smart City with Smart Vehicles and Smart Home -- 10.7 Smart Grid -- References -- Index.
|
530 |
|
|
|a Also available in print edition.
|
533 |
|
|
|a Electronic reproduction.
|b New York, N.Y. :
|c McGraw Hill,
|d 2021.
|n Mode of access: World Wide Web.
|n System requirements: Web browser.
|n Access may be restricted to users at subscribing institutions.
|
538 |
|
|
|a Mode of access: Internet via World Wide Web.
|
546 |
|
|
|a In English.
|
588 |
|
|
|a Description based on e-Publication PDF.
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a Gambheer, Ramachandra,
|e author.
|
700 |
1 |
|
|a Vohra, Meenakshi,
|e author.
|
776 |
0 |
8 |
|i Print version:
|t Design of Secure IoT Systems : A Practical Approach Across Industries.
|b First Edition.
|d New York, N.Y. : McGraw-Hill Education, 2021
|z 9781260463095
|w (OCLC)1259545771
|
856 |
4 |
0 |
|u https://accessengineeringlibrary.uam.elogim.com/content/book/9781260463095
|z Texto completo
|