|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn958936667 |
003 |
OCoLC |
005 |
20231120112137.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
160922s2017 mau ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OPELS
|d OCLCO
|d IDEBK
|d OCLCO
|d TEFOD
|d OCLCO
|d YDX
|d OCLCO
|d QCL
|d UPM
|d S4S
|d OCLCQ
|d U3W
|d D6H
|d OCLCF
|d BRX
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 960895214
|a 965413088
|
020 |
|
|
|a 9780124199903
|q (electronic bk.)
|
020 |
|
|
|a 0124199909
|q (electronic bk.)
|
020 |
|
|
|z 9780124199712
|
035 |
|
|
|a (OCoLC)958936667
|z (OCoLC)960895214
|z (OCoLC)965413088
|
050 |
|
4 |
|a QA76.5915
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.67/8
|2 23
|
100 |
1 |
|
|a Macaulay, Tyson,
|e author.
|
245 |
1 |
0 |
|a RIoT control :
|b understanding and managing risks and the internet of things /
|c Tyson Macaulay.
|
264 |
|
1 |
|a Cambridge, MA :
|b Morgan Kaufmann,
|c [2017]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
520 |
|
|
|a RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
|
504 |
|
|
|a Includes bibliographical references and index.
|
650 |
|
0 |
|a Internet of things
|x Management.
|
650 |
|
0 |
|a Ubiquitous computing.
|
650 |
|
0 |
|a Embedded Internet devices.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Internet des objets
|0 (CaQQLa)000269177
|x Gestion.
|0 (CaQQLa)201-0380063
|
650 |
|
6 |
|a Informatique omnipr�esente.
|0 (CaQQLa)201-0371302
|
650 |
|
6 |
|a Internet int�egr�e.
|0 (CaQQLa)000284368
|
650 |
|
6 |
|a Internet
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0460601
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Embedded Internet devices
|2 fast
|0 (OCoLC)fst01742162
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|0 (OCoLC)fst01751426
|
650 |
|
7 |
|a Ubiquitous computing
|2 fast
|0 (OCoLC)fst01160283
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780124199712
|z Texto completo
|