Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

DEMYSTIFYING INTERNET OF THINGS SECURITY. SUCCESSFUL IOT DEVICE/EDGE AND PLATFORM SECURITY DEPLOYMEN
Título:
DEMYSTIFYING INTERNET OF THINGS SECURITY. SUCCESSFUL IOT DEVICE/EDGE AND PLATFORM SECURITY DEPLOYMEN
Subtítulo:
Autor:
CHERUVU, S
Editorial:
SPRINGER VERLAG
Año de edición:
2019
ISBN:
978-1-4842-2895-1
Páginas:
2019
46,80 €

 

Sinopsis

Gain an understanding of the wired and wireless connectivity technologies for IoT and the associated security requirements
Learn the different security, regulatory, and industry standard body requirements needed for each IoT vertical
Understand the implications of security software on IoT systems as it relates to key management / lifecycle, software and firmware update processes, trusted execution environments, and cloud computing environments



Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions
What You´ll Learn

Secure devices, immunizing them against different threats originating from inside and outside the network
Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms
Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth

Who This Book Is For
Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.