Demystifying Internet of Things security : successful IoT device/edge and platform security deployment / Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler.
Material type: TextPublisher: New York : Apress, 2019Description: 486 pages : illustrations (black and white, and colour) ; 24 cmContent type: text | still image Media type: unmediated Carrier type: volumeISBN: 9781484228951 (pbk.) :Subject(s): Internet of things -- Security measures | Computers and IT | Computers and ITDDC classification: 005.8 Summary: Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defence-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network.Item type | Current library | Home library | Shelving location | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|---|
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 CHE (Browse shelf(Opens below)) | Available | 06725716 |
Total reservations: 0
Browsing Paul Hamlyn Library shelves, Shelving location: Floor 1 Close shelf browser (Hides shelf browser)
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defence-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network.
Specialized.
There are no comments on this title.
Log in to your account to post a comment.