LEADER 03116oam 2200445Mu 450 001 9910793870203321 005 20191022115533.0 010 $a1-000-76261-0 010 $a1-000-76225-4 010 $a0-367-44093-8 035 $a(CKB)4100000009444789 035 $a(MiAaPQ)EBC5916597 035 $a(OCoLC)1122923365 035 $a(OCoLC-P)1122923365 035 $a(FlBoTFG)9780367440930 035 $a(EXLCZ)994100000009444789 100 $a20191012d2019 uy 0 101 0 $aeng 135 $aurcnu---unuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe IoT Architect's Guide to Attainable Security and Privacy$b[electronic resource] 210 $aMilton $cAuerbach Publishers, Incorporated$d2019 215 $a1 online resource (330 pages) 300 $aDescription based upon print version of record. 311 $a0-8153-6816-X 330 $aThis book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."-- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."-- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."-- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."-- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems 606 $aInternet of things$xSecurity measures 615 0$aInternet of things$xSecurity measures. 676 $a005.8 700 $aFagbemi$b Damilare D$01574497 701 $aWheeler$b David M$01574498 701 $aWheeler$b J. C$0460980 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910793870203321 996 $aThe IoT Architect's Guide to Attainable Security and Privacy$93850788 997 $aUNINA