|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1117469508 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190905s2020 nyua o 000 0 eng d |
040 |
|
|
|a GW5XE
|b eng
|e rda
|e pn
|c GW5XE
|d UKMGB
|d SFB
|d COO
|d UKAHL
|d VT2
|d OCLCF
|d OCLCO
|d DST
|d OCLCO
|d OCLCQ
|d AAA
|d OCLCQ
|
015 |
|
|
|a GBB9F7953
|2 bnb
|
016 |
7 |
|
|a 019508473
|2 Uk
|
019 |
|
|
|a 1121102044
|a 1125813105
|a 1136480904
|a 1138962421
|a 1295608843
|a 1295872662
|a 1295990622
|a 1300489442
|a 1303288854
|a 1303422912
|
020 |
|
|
|a 9781484228968
|q (electronic bk.)
|
020 |
|
|
|a 1484228960
|q (electronic bk.)
|
020 |
|
|
|a 9781484228975
|q (print)
|
020 |
|
|
|a 1484228979
|
020 |
|
|
|z 9781484228951
|
020 |
|
|
|z 1484228952
|
024 |
7 |
|
|a 10.1007/978-1-4842-2896-8
|2 doi
|
029 |
1 |
|
|a AU@
|b 000066097368
|
029 |
1 |
|
|a UKMGB
|b 019508473
|
035 |
|
|
|a (OCoLC)1117469508
|z (OCoLC)1121102044
|z (OCoLC)1125813105
|z (OCoLC)1136480904
|z (OCoLC)1138962421
|z (OCoLC)1295608843
|z (OCoLC)1295872662
|z (OCoLC)1295990622
|z (OCoLC)1300489442
|z (OCoLC)1303288854
|z (OCoLC)1303422912
|
037 |
|
|
|a com.springer.onix.9781484228968
|b Springer Nature
|
050 |
|
4 |
|a TK5105.8857
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cheruvu, Sunil,
|e author.
|
245 |
1 |
0 |
|a Demystifying Internet of Things security :
|b successful IoT device/edge and platform security deployment /
|c Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler.
|
264 |
|
1 |
|a New York :
|b Apress,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations (black and white, and color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
506 |
|
|
|a Open access.
|5 GW5XE
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements.
|
520 |
|
|
|a Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet of things
|x Security measures.
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Communication Networks
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Internet des objets
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information.
|
650 |
|
7 |
|a information technology.
|2 aat
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information technology.
|2 fast
|0 (OCoLC)fst00973089
|
700 |
1 |
|
|a Kumar, Anil,
|e author.
|
700 |
1 |
|
|a Smith, Ned,
|e author.
|
700 |
1 |
|
|a Wheeler, David,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Cheruvu, Sunil.
|t Demystifying Internet of Things security.
|d New York : Apress, 2019
|z 9781484228951
|w (OCoLC)1111295738
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484228968/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36710591
|
994 |
|
|
|a 92
|b IZTAP
|