Cargando…

Defending IoT infrastructures with the Raspberry Pi : monitoring and detecting nefarious behavior in real time /

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hosmer, Chet
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1043865480
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 180712s2018 xxu o 000 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d GW5XE  |d N$T  |d EBLCP  |d OCLCF  |d GZM  |d UMI  |d UAB  |d VT2  |d STF  |d U3W  |d AAA  |d MOQ  |d OH1  |d CEF  |d G3B  |d LVT  |d WYU  |d UKMGB  |d SNK  |d YOU  |d K6U  |d MERER  |d OCLCQ  |d COO  |d UKAHL  |d LEAUB  |d AU@  |d OCLCQ  |d UHL  |d OCLCQ  |d BRF  |d DCT  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AUD  |d OCLCQ 
015 |a GBB912988  |2 bnb 
016 7 |a 019206051  |2 Uk 
019 |a 1050170788  |a 1055366786  |a 1066569173  |a 1081230615  |a 1086465513  |a 1113636275  |a 1203988555  |a 1264750819 
020 |a 9781484237007  |q (electronic bk.) 
020 |a 1484237005  |q (electronic bk.) 
020 |z 9781484236994 
020 |z 1484236998 
024 7 |a 10.1007/978-1-4842-3700-7  |2 doi 
029 1 |a AU@  |b 000063892924 
029 1 |a AU@  |b 000066231091 
029 1 |a CHNEW  |b 001063633 
029 1 |a CHVBK  |b 575141999 
029 1 |a UKMGB  |b 019206051 
029 1 |a AU@  |b 000069003795 
035 |a (OCoLC)1043865480  |z (OCoLC)1050170788  |z (OCoLC)1055366786  |z (OCoLC)1066569173  |z (OCoLC)1081230615  |z (OCoLC)1086465513  |z (OCoLC)1113636275  |z (OCoLC)1203988555  |z (OCoLC)1264750819 
037 |a CL0500000988  |b Safari Books Online 
050 4 |a TK5105.8857  |b .H67 2018eb 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.67/8  |2 23 
049 |a UAMI 
100 1 |a Hosmer, Chet. 
245 1 0 |a Defending IoT infrastructures with the Raspberry Pi :  |b monitoring and detecting nefarious behavior in real time /  |c Chet Hosmer. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 0 |a Print version record. 
505 0 |a IoT volnerabilities -- Classifying and modeling IoT behavior -- Raspberry pi configuration and packetrecorder.py enhancements -- Raspberry pi as a sensor -- Operating the raspberry pi sensor -- Adding finishing touches -- Future work. 
520 |a Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet of things  |x Security measures. 
650 0 |a Raspberry Pi (Computer) 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
650 6 |a Raspberry Pi (Ordinateur) 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Raspberry Pi (Computer)  |2 fast  |0 (OCoLC)fst01895174 
773 0 |t Springer eBooks 
776 0 8 |i Print version:  |z 1484236998  |z 9781484236994  |w (OCoLC)1034617131 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484237007/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35093502 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5485320 
938 |a EBSCOhost  |b EBSC  |n 1863814 
938 |a YBP Library Services  |b YANK  |n 15586371 
994 |a 92  |b IZTAP