A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book * Learn to design and implement cyber security strategies for your organization * Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem * Learn best practices to secure your data from device to the cloud * Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn * Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments * Build a rock-solid security program for IoT that is cost-effective and easy to maintain * Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture * See how the selection of individual components can affect the security posture of the entire system * Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem * Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In Detail With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Style and approach This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Brian Russell ( https://www.linkedin.com/in/brian-russell-65a4991) is a Chief Engineer focused on Cyber Security Solutions for Leidos. He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers, with a focus on a secure Internet of Things (IoT). Brian leads efforts that include security engineering for Unmanned Aerial Systems (UAS) and Connected Vehicles, next- generation energy systems (microgrids), and the development of cryptographic key management systems. He has 16 years of cyber security experience and supports the Center for Internet Security (CIS) as a member of the 20 Critical Security Controls Editorial Panel. Brian also serves as Chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, is a member of the Federal Communications Commission (FCC) Technological Advisory Council (TAC) Cyber Security Working Group for IoT, and is a contributor to the Securing Smart Cities Initiative ( http://securingsmartcities.org/).
Drew Van Duren ( https://www.linkedin.com/pub/drew-van-duren/4/7b5/33a)is a senior cryptographic and cybersecurity engineer at Leidos (www.leidos.com), highlighting 15 years of support to commercial, Department of Defense (DoD), Intelligence, and Department of Transportation (USDOT) customers in their efforts to secure vital national systems. Originally an aeronautical engineer, his experience evolved into cyber-physical (transportation system) risk management, secure cryptographic communications design, as well as software and network engineering analysis/design for cryptographic network protocols. He has performed extensive UAS risk/threat modeling, has security mitigation expertise in the FAA Unmanned Air System (UAS) integration office, and, in conjunction with the RTCA, developed cryptographic security requirements for unmanned aircraft planning to operate in the US National Airspace System (NAS). He has also supported USDOT and the automotive industry in threat modeling and security/conformance testing for Connected Vehicle operations and systems, culminating in recommended design modifications for the largest anticipated public key infrastructure (PKI) in the world: the Connected Vehicles Security Credential Management System (SCMS). Drew has managed the largest FIPS 140-2 (cryptographic module) cryptographic testing laboratories; directed and performed extensive cryptographic security engineering and designed system architectures for high-assurance DoD systems; directed large PKI and key management engineering efforts; and has led multiple software development and interoperability test programs. He continues to interface with standards bodies such as the National Institutes for Standards and Technology (NIST) Cryptographic Module Validation Program (CMVP) and the US Department of Transportation and RTCA; he also provides ongoing security analysis and cybersecurity best practices engineering expertise to the US Government.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Spese di spedizione:
GRATIS
In U.S.A.
Spese di spedizione:
EUR 3,81
In U.S.A.
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.35. Codice articolo G178588963XI3N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.35. Codice articolo G178588963XI4N00
Quantità: 1 disponibili
Da: medimops, Berlin, Germania
Condizione: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Codice articolo M0178588963X-V
Quantità: 1 disponibili
Da: GF Books, Inc., Hawthorne, CA, U.S.A.
Condizione: Very Good. Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 0.79. Codice articolo 178588963X-2-3
Quantità: 1 disponibili
Da: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-F-060-01350
Quantità: 1 disponibili
Da: Book Deals, Tucson, AZ, U.S.A.
Condizione: Very Good. Very Good condition. Shows only minor signs of wear, and very minimal markings inside (if any). 0.79. Codice articolo 353-178588963X-vrg
Quantità: 1 disponibili
Da: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condizione: Good. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Codice articolo 002007242U
Quantità: 2 disponibili
Da: Book Deals, Tucson, AZ, U.S.A.
Condizione: Fair. Acceptable/Fair condition. Book is worn, but the pages are complete, and the text is legible. Has wear to binding and pages, may be ex-library. 0.79. Codice articolo 353-178588963X-acp
Quantità: 1 disponibili
Da: Books of the Smoky Mountains, Del Rio, TN, U.S.A.
Condizione: very good. Gently used book with ongoing seller support until you're fully satisfied with your purchase. Codice articolo oldport178588963X
Quantità: 1 disponibili
Da: GoldBooks, Denver, CO, U.S.A.
Paperback. Condizione: very good. Very Good Copy. Customer Service Guaranteed. Codice articolo think_very_178588963X
Quantità: 1 disponibili