Pustaka Digital

Forum Perpustakaan Perguruan Tinggi Jawa Tengah

  • Beranda
  • Informasi
  • Berita
  • Bantuan
  • Pendaftaran Anggota
  • Area Anggota
  • Pilih Bahasa :
    Bahasa Arab Bahasa Bengal Bahasa Brazil Portugis Bahasa Inggris Bahasa Spanyol Bahasa Jerman Bahasa Indonesia Bahasa Jepang Bahasa Melayu Bahasa Persia Bahasa Rusia Bahasa Thailand Bahasa Turki Bahasa Urdu

Pencarian berdasarkan :

SEMUA Pengarang Subjek ISBN/ISSN Pencarian Spesifik

Pencarian terakhir:

{{tmpObj[k].text}}
Image of Demystifying Internet of Things security :successful IoT device/edge and platform security deployment
Penanda Bagikan

Electronic Resource

Demystifying Internet of Things security :successful IoT device/edge and platform security deployment

Cheruvu, Sunil - Nama Orang; Kumar, Anil - Nama Orang; Smith, Ned - Nama Orang; Wheeler, David M. - Nama Orang;

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.


Ketersediaan

Tidak ada salinan data

Informasi Detail
Judul Seri
-
No. Panggil
005.8 DEM d
Penerbit
New York : Apress Open., 2020
Deskripsi Fisik
xxx, 488p. : ill.
Bahasa
English
ISBN/ISSN
9781484228968
Klasifikasi
005.8
Tipe Isi
text
Tipe Media
computer
Tipe Pembawa
online resource
Edisi
-
Subjek
Internet
Computer security
Humans
Confidentiality
Security Measures
Info Detail Spesifik
-
Pernyataan Tanggungjawab
-
Versi lain/terkait

Tidak tersedia versi lain

Lampiran Berkas
  • Harap masuk untuk melihat lampiran
Komentar

Anda harus masuk sebelum memberikan komentar

Pustaka Digital
  • Informasi
  • Layanan
  • Pustakawan
  • Area Anggota

Tentang Kami

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Cari

masukkan satu atau lebih kata kunci dari judul, pengarang, atau subjek

Donasi untuk SLiMS Kontribusi untuk SLiMS?

© 2025 — Senayan Developer Community

Ditenagai oleh SLiMS
Pilih subjek yang menarik bagi Anda
  • Karya Umum
  • Filsafat
  • Agama
  • Ilmu-ilmu Sosial
  • Bahasa
  • Ilmu-ilmu Murni
  • Ilmu-ilmu Terapan
  • Kesenian, Hiburan, dan Olahraga
  • Kesusastraan
  • Geografi dan Sejarah
Icons made by Freepik from www.flaticon.com
Pencarian Spesifik
Kemana ingin Anda bagikan?