LEADER 03043nam 22005655 450 001 9911049209303321 005 20260102123006.0 010 $a979-88-6882-367-1 024 7 $a10.1007/979-8-8688-2367-1 035 $a(CKB)44770125200041 035 $a(MiAaPQ)EBC32470763 035 $a(Au-PeEL)EBL32470763 035 $a(CaSebORM)9798868823671 035 $a(OCoLC)1568043370 035 $a(OCoLC-P)1568043370 035 $a(DE-He213)979-8-8688-2367-1 035 $a(EXLCZ)9944770125200041 100 $a20260102d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring Smart Things $eA Hands-On Guide to Safeguarding Smart Systems /$fby Massimo Nardone 205 $a1st ed. 2026. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2026. 215 $a1 online resource (88 pages) 225 1 $aApress Pocket Guides,$x3004-9288 300 $aDescription based upon print version of record. 311 08$a979-88-6882-366-4 327 $aChapter1: Foundations of IoT and the Security Landscape Description -- Chapter 2: Vulnerabilities in IoT Systems -- Chapter 3: Threats and Cybersecurity Attack Vectors for IoT -- Chapter 4: Securing the Future of IoT. 330 $aAs the Internet of Things (IoT) continues to reshape industries?from smart homes and healthcare to manufacturing and mobility?the need for robust, real-world security solutions has never been more urgent. This book is a hands-on guide to understanding and implementing practical IoT security strategies. This accessible introduction goes beyond theory to focus on what matters most: protecting connected devices, securing networks, and ensuring data integrity across complex ecosystems. The book shows how to identify vulnerabilities, mitigate risks, and apply proven techniques to safeguard everything from consumer gadgets to industrial systems. Whether you're deploying smart sensors in a factory or managing a fleet of connected medical devices, this book equips you with the tools and knowledge to build secure, resilient IoT systems?today and into the future. You Will Learn To: Harden IoT devices against common attack vectors Secure communication channels and network infrastructure Protect the IoT supply chain from end to end Strengthen data privacy and meet compliance requirements. 410 0$aApress Pocket Guides,$x3004-9288 606 $aInternet of things 606 $aComputer networks$xSecurity measures 606 $aInternet of Things 606 $aMobile and Network Security 615 0$aInternet of things. 615 0$aComputer networks$xSecurity measures. 615 14$aInternet of Things. 615 24$aMobile and Network Security. 676 $a005.8 700 $aNardone$b Massimo$0969219 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911049209303321 996 $aSecuring Smart Things$94520982 997 $aUNINA