LEADER 03992 am 22007213u 450 001 9910369903503321 005 20230125214104.0 010 $a1-4842-2896-0 024 7 $a10.1007/978-1-4842-2896-8 035 $a(CKB)4100000009046442 035 $a(DE-He213)978-1-4842-2896-8 035 $a(MiAaPQ)EBC5940957 035 $a(Au-PeEL)EBL5940957 035 $a(OCoLC)1132428035 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/39473 035 $a(CaSebORM)9781484228968 035 $a(PPN)252511530 035 $a(EXLCZ)994100000009046442 100 $a20190813d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDemystifying Internet of Things Security$b[electronic resource] $eSuccessful IoT Device/Edge and Platform Security Deployment /$fby Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler 205 $a1st ed. 2020. 210 $aBerkeley, CA$cSpringer Nature$d2020 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XXX, 488 p. 152 illus., 134 illus. in color.) 311 $a1-4842-2895-2 327 $aChapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements. 330 $aBreak down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. 606 $aComputer communication systems 606 $aComputer security 606 $aInformation technology 606 $aBusiness?Data processing 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 610 $aComputer science 610 $aComputer communication systems 610 $aComputer security 610 $aInformation technology 610 $aBusiness?Data processing 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aIT in Business. 676 $a004.6 700 $aCheruvu$b Sunil$4aut$4http://id.loc.gov/vocabulary/relators/aut$0960015 702 $aKumar$b Anil$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSmith$b Ned$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWheeler$b David M$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910369903503321 996 $aDemystifying Internet of Things Security$92175851 997 $aUNINA