Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book explores how to secure the future state of the Internet of Things. Looking at an imminent future filled with computers that also moonlight as "things", the guide dissect the present and future threats to assets, digital and other wise. To avoid the significant technical debt which is likely to manifest as IoT adoption increases, it's important to think ahead. To that effect, the book examines how to design IoT solutions that provide end-to-end security and privacy at scale, delves into IoT economy from the perspective of both defenders and attackers, and discusses the implications of security usability.…mehr
This book explores how to secure the future state of the Internet of Things. Looking at an imminent future filled with computers that also moonlight as "things", the guide dissect the present and future threats to assets, digital and other wise. To avoid the significant technical debt which is likely to manifest as IoT adoption increases, it's important to think ahead. To that effect, the book examines how to design IoT solutions that provide end-to-end security and privacy at scale, delves into IoT economy from the perspective of both defenders and attackers, and discusses the implications of security usability.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Damilare D. Fagbemi, David Wheeler, JC Wheeler
Inhaltsangabe
Dedication Contents Foreword by Dr. James Ransome Foreword by Erv Comer Preface Acknowledgments About the Authors Part One Chapter 1 How We Got Here Damilare Fagbemi, Dave Wheeler, and JC Wheeler Chapter 2 The IoT Castle and Its Many Gates Damilare Fagbemi and Dave Wheeler Chapter 3 The IoT Security Economy Damilare Fagbemi and Dave Wheeler Part Two Chapter 4 Architecting IoT Systems That Scale Securely Dave Wheeler Chapter 5 Security Architecture for Real IoT Systems Dave Wheeler Chapter 6 Securing the IoT Cloud Damilare Fagbemi Chapter 7 Securely Connecting the Unconnected Dave Wheeler Chapter 8 Privacy, Pirates, and the Tale of a Smart City JC Wheeler Chapter 9 Privacy Controls in an Age of Ultra-Connectedness Dave Wheeler and Damilare Fagbemi Chapter 10 Security Usability: Human, Computer, and Security Interaction Damilare Fagbemi Part Three Chapter 11 Earth 2040-Peeking at the Future Damilare Fagbemi Epilogue Index
Dedication
Contents
Foreword by Dr. James Ransome
Foreword by Erv Comer
Preface
Acknowledgments
About the Authors
Part One
Chapter 1 How We Got Here
Damilare Fagbemi, Dave Wheeler, and JC Wheeler
Chapter 2 The IoT Castle and Its Many Gates
Damilare Fagbemi and Dave Wheeler
Chapter 3 The IoT Security Economy
Damilare Fagbemi and Dave Wheeler
Part Two
Chapter 4 Architecting IoT Systems That Scale Securely
Dave Wheeler
Chapter 5 Security Architecture for Real IoT Systems
Dave Wheeler
Chapter 6 Securing the IoT Cloud
Damilare Fagbemi
Chapter 7 Securely Connecting the Unconnected
Dave Wheeler
Chapter 8 Privacy, Pirates, and the Tale of a Smart City
JC Wheeler
Chapter 9 Privacy Controls in an Age of Ultra-Connectedness
Dave Wheeler and Damilare Fagbemi
Chapter 10 Security Usability: Human, Computer, and Security Interaction
Dedication Contents Foreword by Dr. James Ransome Foreword by Erv Comer Preface Acknowledgments About the Authors Part One Chapter 1 How We Got Here Damilare Fagbemi, Dave Wheeler, and JC Wheeler Chapter 2 The IoT Castle and Its Many Gates Damilare Fagbemi and Dave Wheeler Chapter 3 The IoT Security Economy Damilare Fagbemi and Dave Wheeler Part Two Chapter 4 Architecting IoT Systems That Scale Securely Dave Wheeler Chapter 5 Security Architecture for Real IoT Systems Dave Wheeler Chapter 6 Securing the IoT Cloud Damilare Fagbemi Chapter 7 Securely Connecting the Unconnected Dave Wheeler Chapter 8 Privacy, Pirates, and the Tale of a Smart City JC Wheeler Chapter 9 Privacy Controls in an Age of Ultra-Connectedness Dave Wheeler and Damilare Fagbemi Chapter 10 Security Usability: Human, Computer, and Security Interaction Damilare Fagbemi Part Three Chapter 11 Earth 2040-Peeking at the Future Damilare Fagbemi Epilogue Index
Dedication
Contents
Foreword by Dr. James Ransome
Foreword by Erv Comer
Preface
Acknowledgments
About the Authors
Part One
Chapter 1 How We Got Here
Damilare Fagbemi, Dave Wheeler, and JC Wheeler
Chapter 2 The IoT Castle and Its Many Gates
Damilare Fagbemi and Dave Wheeler
Chapter 3 The IoT Security Economy
Damilare Fagbemi and Dave Wheeler
Part Two
Chapter 4 Architecting IoT Systems That Scale Securely
Dave Wheeler
Chapter 5 Security Architecture for Real IoT Systems
Dave Wheeler
Chapter 6 Securing the IoT Cloud
Damilare Fagbemi
Chapter 7 Securely Connecting the Unconnected
Dave Wheeler
Chapter 8 Privacy, Pirates, and the Tale of a Smart City
JC Wheeler
Chapter 9 Privacy Controls in an Age of Ultra-Connectedness
Dave Wheeler and Damilare Fagbemi
Chapter 10 Security Usability: Human, Computer, and Security Interaction
Damilare Fagbemi
Part Three
Chapter 11 Earth 2040-Peeking at the Future
Damilare Fagbemi
Epilogue
Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826