LEADER 01011nam a2200265 i 4500 001 991000474549707536 008 091202s2009 it 001 0 ita d 020 $a9788883536908 035 $ab13862698-39ule_inst 040 $aDip.to SSC$bita 082 0 $a320.101 100 1 $aButler, Judith$0175620 245 10$aChe fine ha fatto lo stato-nazione? /$cJudith Butler, Gayatri Chakravorty Spivak ; cura e traduzione di Ambra Pirri 260 $aRoma :$bMeltemi,$c2009 300 $a93 p. ;$c19 cm 440 0$aMelusine ;$v88 650 4$aStato$xTeorie 700 1 $aSpivak, Gayatri Chakravorty$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0324501 700 1 $aPirri, Ambra 907 $a.b13862698$b12-01-10$c02-12-09 912 $a991000474549707536 945 $aLE021 SOC26A93$g1$i2021000173011$lle021$o-$pE13.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i15051377$z18-12-09 996 $aChe fine ha fatto lo stato-nazione$91440497 997 $aUNISALENTO 998 $ale021$b02-12-09$cm$da $e-$fita$git $h0$i0 LEADER 03992 am 22007213u 450 001 9910369903503321 005 20230125214104.0 010 $a1-4842-2896-0 024 7 $a10.1007/978-1-4842-2896-8 035 $a(CKB)4100000009046442 035 $a(DE-He213)978-1-4842-2896-8 035 $a(MiAaPQ)EBC5940957 035 $a(Au-PeEL)EBL5940957 035 $a(OCoLC)1132428035 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/39473 035 $a(CaSebORM)9781484228968 035 $a(PPN)252511530 035 $a(EXLCZ)994100000009046442 100 $a20190813d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDemystifying Internet of Things Security$b[electronic resource] $eSuccessful IoT Device/Edge and Platform Security Deployment /$fby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler 205 $a1st ed. 2020. 210 $aBerkeley, CA$cSpringer Nature$d2020 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XXX, 488 p. 152 illus., 134 illus. in color.) 311 $a1-4842-2895-2 327 $aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. 330 $aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. 606 $aComputer communication systems 606 $aComputer security 606 $aInformation technology 606 $aBusiness?Data processing 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 610 $aComputer science 610 $aComputer communication systems 610 $aComputer security 610 $aInformation technology 610 $aBusiness?Data processing 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aIT in Business. 676 $a004.6 700 $aCheruvu$b Sunil$4aut$4http://id.loc.gov/vocabulary/relators/aut$0960015 702 $aKumar$b Anil$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSmith$b Ned$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWheeler$b David M$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910369903503321 996 $aDemystifying Internet of Things Security$92175851 997 $aUNINA