HOME > 상세정보

상세정보

Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world (2회 대출)

자료유형
단행본
개인저자
Russell, Brian. Van Duren, Drew.
서명 / 저자사항
Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / Brian Russell, Drew Van Duren.
발행사항
Birmingham, UK :   Packt Publishing,   c2016.  
형태사항
xiii, 313 p. : ill. ; 24 cm.
총서사항
Community experience distilled
ISBN
9781785889639 178588963X
요약
Annotation
일반주기
Includes index.  
일반주제명
Internet of things. Computer networks --Security measures. Computer security. Database management.
000 00000cam u2200205 a 4500
001 000045919610
005 20171102154552
008 171102s2016 enka 001 0 eng d
020 ▼a 9781785889639
020 ▼a 178588963X
037 ▼a CL0500000763 ▼b Safari Books Online
037 ▼a DAC16AB9-C07B-4CEE-BBB1-30AC51BEBACA ▼b OverDrive, Inc. ▼n http://www.overdrive.com
040 ▼a 211009 ▼c 211009 ▼d 211009
050 4 ▼a QA76.9.A25
082 0 4 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b R961p
100 1 ▼a Russell, Brian.
245 1 0 ▼a Practical internet of things security : ▼b a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world / ▼c Brian Russell, Drew Van Duren.
260 ▼a Birmingham, UK : ▼b Packt Publishing, ▼c c2016.
300 ▼a xiii, 313 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Community experience distilled
500 ▼a Includes index.
520 8 ▼a Annotation ▼b A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future.In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.
650 0 ▼a Internet of things.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Computer security.
650 0 ▼a Database management.
700 1 ▼a Van Duren, Drew.
830 0 ▼a Community experience distilled.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 R961p 등록번호 121242223 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

About This Book

  • Learn to design and implement cyber security strategies for your organization
  • Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem
  • Learn best practices to secure your data from device to the cloud
  • Gain insight into privacy-enhancing techniques and technologies

Who This Book Is For

This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.

What You Will Learn

  • Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments
  • Build a rock-solid security program for IoT that is cost-effective and easy to maintain
  • Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture
  • See how the selection of individual components can affect the security posture of the entire system
  • Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem
  • Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future.

In Detail

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.

This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.

Style and approach

This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.


정보제공 : Aladin

저자소개

드류 반 듀란(지은이)

15년 동안 미국 국방부(US Department of Defense)와 미국 교통부(USDOT, US Department of Transportation)에서 업무를 수행했고, 현재 수석 암호화 및 사이버 보안 엔지니어로 레이도스에서 중요한 교통 및 국가 안보 시스템 업무를 담당하고 있다. 항공 우주 엔지니어로 이 분야에 몸담기 시작해 사이버 물리(교통 시스템) 위험 관리, 암호화 통신공학, 고수준의 보증 DoD 시스템을 위한 안전한 네트워크 프로토콜 설계와 관련된 연구를 수행 중이다. 연방 항공국(Federal Aviation Administration)의 무인 항공기 시스템(UAS) 통합 사무국에서 전문 지식을 전파하고 있으며, 미국 영공 시스템에서 비행하는 무인 항공기에 적용되는 암호 보호 개발을 위한 RTCA 표준화 단체를 지원하고 있다. 커넥티드 비클 보안 자격 증명 관리 시스템(SCMS, security credential management system)을 통해 커넥티드 비클 통신 설계, 보안 시스템, 지표 운송 시스템, 암호 인증 작업의 위협 모델링, 보안 분석을 지원했고 USDOT 연방 도로관리청(FHWA, Federal Highway Administration)과 자동차 산업을 지원했다. 운송 업계에 몸담기 전에는 기술 이사로서 가장 규모가 큰 두 암호화 시험 기관(FIPS 140-2)을 관리했으며, 다양한 국가 보안 프로그램의 암호화 키 관리 및 프로토콜 개발에 기여했다. 비행 면허를 보유한 조종사로서 상업용 무인 항공기 시스템을 운용하고 있으며, 무인 항공기의 안전하고 신뢰할 만한 비행 작전을 위해 헌신하고 있는 '책임감 있는 보틱스(Responsible Robotics) 재단'의 공동 설립자이기도 하다.

브라이언 러셀(지은이)

레이도스(Leidos)의 사이버 보안 솔루션 담당 수석 엔지니어다. 보안 솔루션의 설계 및 개발과 사물인터넷(IoT, Internet of Things)의 보안에 중점을 둔 고객의 개인정보 보호와 신뢰 제어의 구현을 담당하고 있다. 무인 항공기 시스템(UAS), 커넥티드 비클, 고수준 암호화 키 관리 시스템을 포함한 개발 보안 시스템과 관련된 보안 공학 분야를 선도하고자 노력하고 있으며, 보안 분야에서 16년의 경력을 보유했다. 클라우드 보안 연합(CSA, Cloud Security Alliance)의 의장이며, 연방 통신위원회(FCC, Federal Communications Commission) 기술 자문위원회(TAC, Technological Advisory Council) 실무 그룹의 구성원이다. 인터넷 보안 센터(CIS, Center for Internet Security)에서 '20가지 중요 보안 통제 편집 패널'과 안전한 스마트 시티(SSC, Securing Smart Cities)를 지원하고 있다.

정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)