Show simple item record

dc.contributor.authorCheruvu, Sunil
dc.contributor.authorKumar, Anil
dc.contributor.authorSmith, Ned
dc.contributor.authorWheeler, David M.
dc.date.accessioned2020-03-18 13:36:15
dc.date.accessioned2020-04-01T08:53:35Z
dc.date.available2020-04-01T08:53:35Z
dc.date.issued2020
dc.identifier1007321
dc.identifier.urihttp://library.oapen.org/handle/20.500.12657/22840
dc.description.abstractBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
dc.languageEnglish
dc.subject.classificationthema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systemsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardwareen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.otherComputer science
dc.subject.otherComputer communication systems
dc.subject.otherComputer security
dc.subject.otherInformation technology
dc.subject.otherBusiness—Data processing
dc.titleDemystifying Internet of Things Security
dc.title.alternativeSuccessful IoT Device/Edge and Platform Security Deployment
dc.typebook
oapen.identifier.doi10.1007/978-1-4842-2896-8
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.pages488
oapen.place.publicationBerkeley, CA


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record