top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
IoT security issues / / Alasdair Gilchrist
IoT security issues / / Alasdair Gilchrist
Autore Gilchrist Alasdair
Edizione [First edition.]
Pubbl/distr/stampa Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Descrizione fisica 1 online resource (274 pages) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Computer networks - Security measures
Soggetto non controllato Hacking
IPv6
Internet of Things
IoT
Sensors
Vulnerabilities
ISBN 1-5015-0562-9
1-5015-0577-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Acknowledgements -- Contents -- Introduction -- Part I: Making Sense of the Hype -- Chapter 1 - The Consumer Internet of Things -- Part II: Security -- Chapter 2 - It's Not Just About the Future -- Chapter 3 - Flawed, Insecure Devices -- Chapter 4 - Securing the Unidentified -- Chapter 5 - Consumer Convenience Trumps Security -- Chapter 6 - Startups Driving the IoT -- Chapter 7 - Cyber-Security and the Customer Experience -- Chapter 8 - Security Requirements for the IoT -- Chapter 9 - Re-engineering the IoT -- Chapter 10 - IoT Production, Security and Strength -- Chapter 11 - Wearable's - A New Developer's Headache -- Chapter 12 - New Surface Threats -- Part III: Architecting the Secure IoT -- Chapter 13 - Designing the Secure IoT -- Chapter 14 - Secure IoT Architecture Patterns -- Chapter 15 - Threat Models -- Part IV: Defending the IoT -- Chapter 16 - Threats, Vulnerabilities and Risks -- Chapter 17 - IoT Security Framework -- Chapter 18 - Secure IoT Design -- Chapter 19 - Utilizing IPv6 Security Features -- Part V: Trust -- Chapter 20 - The IoT of Trust -- Chapter 21 - It's All About the Data -- Chapter 22 - Trusting the Device -- Chapter 23 - Who Can We Trust? -- Part VI: Privacy -- Chapter 24 - Personal Private Information (PIP) -- Chapter 25 - The U.S. and EU Data Privacy Shield -- Part VII: Surveillance, Subterfuge and Sabotage -- Chapter 26 - The Panopticon -- Index
Record Nr. UNINA-9910792540303321
Gilchrist Alasdair  
Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT security issues / / Alasdair Gilchrist
IoT security issues / / Alasdair Gilchrist
Autore Gilchrist Alasdair
Edizione [First edition.]
Pubbl/distr/stampa Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Descrizione fisica 1 online resource (274 pages) : illustrations
Disciplina 005.8
Soggetto topico Internet - Security measures
Computer networks - Security measures
Soggetto non controllato Hacking
IPv6
Internet of Things
IoT
Sensors
Vulnerabilities
ISBN 1-5015-0562-9
1-5015-0577-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Acknowledgements -- Contents -- Introduction -- Part I: Making Sense of the Hype -- Chapter 1 - The Consumer Internet of Things -- Part II: Security -- Chapter 2 - It's Not Just About the Future -- Chapter 3 - Flawed, Insecure Devices -- Chapter 4 - Securing the Unidentified -- Chapter 5 - Consumer Convenience Trumps Security -- Chapter 6 - Startups Driving the IoT -- Chapter 7 - Cyber-Security and the Customer Experience -- Chapter 8 - Security Requirements for the IoT -- Chapter 9 - Re-engineering the IoT -- Chapter 10 - IoT Production, Security and Strength -- Chapter 11 - Wearable's - A New Developer's Headache -- Chapter 12 - New Surface Threats -- Part III: Architecting the Secure IoT -- Chapter 13 - Designing the Secure IoT -- Chapter 14 - Secure IoT Architecture Patterns -- Chapter 15 - Threat Models -- Part IV: Defending the IoT -- Chapter 16 - Threats, Vulnerabilities and Risks -- Chapter 17 - IoT Security Framework -- Chapter 18 - Secure IoT Design -- Chapter 19 - Utilizing IPv6 Security Features -- Part V: Trust -- Chapter 20 - The IoT of Trust -- Chapter 21 - It's All About the Data -- Chapter 22 - Trusting the Device -- Chapter 23 - Who Can We Trust? -- Part VI: Privacy -- Chapter 24 - Personal Private Information (PIP) -- Chapter 25 - The U.S. and EU Data Privacy Shield -- Part VII: Surveillance, Subterfuge and Sabotage -- Chapter 26 - The Panopticon -- Index
Record Nr. UNINA-9910807489703321
Gilchrist Alasdair  
Boston, [Massachusetts] ; ; Berlin, [Germany] : , : De G Press, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui