Cargando…

RIoT control : understanding and managing risks and the internet of things /

RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more int...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Macaulay, Tyson (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Morgan Kaufmann, [2017]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn958936667
003 OCoLC
005 20231120112137.0
006 m o d
007 cr cnu|||unuuu
008 160922s2017 mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d OPELS  |d OCLCO  |d IDEBK  |d OCLCO  |d TEFOD  |d OCLCO  |d YDX  |d OCLCO  |d QCL  |d UPM  |d S4S  |d OCLCQ  |d U3W  |d D6H  |d OCLCF  |d BRX  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 960895214  |a 965413088 
020 |a 9780124199903  |q (electronic bk.) 
020 |a 0124199909  |q (electronic bk.) 
020 |z 9780124199712 
035 |a (OCoLC)958936667  |z (OCoLC)960895214  |z (OCoLC)965413088 
050 4 |a QA76.5915 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 004.67/8  |2 23 
100 1 |a Macaulay, Tyson,  |e author. 
245 1 0 |a RIoT control :  |b understanding and managing risks and the internet of things /  |c Tyson Macaulay. 
264 1 |a Cambridge, MA :  |b Morgan Kaufmann,  |c [2017] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Vendor-supplied metadata. 
520 |a RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases. 
504 |a Includes bibliographical references and index. 
650 0 |a Internet of things  |x Management. 
650 0 |a Ubiquitous computing. 
650 0 |a Embedded Internet devices. 
650 0 |a Internet  |x Security measures. 
650 6 |a Internet des objets  |0 (CaQQLa)000269177  |x Gestion.  |0 (CaQQLa)201-0380063 
650 6 |a Informatique omnipr�esente.  |0 (CaQQLa)201-0371302 
650 6 |a Internet int�egr�e.  |0 (CaQQLa)000284368 
650 6 |a Internet  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0460601 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Embedded Internet devices  |2 fast  |0 (OCoLC)fst01742162 
650 7 |a Internet  |x Security measures  |2 fast  |0 (OCoLC)fst01751426 
650 7 |a Ubiquitous computing  |2 fast  |0 (OCoLC)fst01160283 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780124199712  |z Texto completo