skip to content
The IoT Architect's Guide to Attainable Security and Privacy Preview this item
ClosePreview this item
Checking...

The IoT Architect's Guide to Attainable Security and Privacy

Author: Damilare D Fagbemi; David M Wheeler; J C Wheeler
Publisher: Milton : Auerbach Publishers, Incorporated, 2019.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy.  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Fagbemi, Oluwadamilare Oluwadamilola.
IoT Architect's Guide to Attainable Security and Privacy.
Milton : Auerbach Publishers, Incorporated, ©2019
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Damilare D Fagbemi; David M Wheeler; J C Wheeler
ISBN: 9781000762259 1000762254 9780367440930 0367440938 9781000762617 1000762610 9781000762433 1000762432
OCLC Number: 1122923365
Description: 1 online resource (330 pages)
Contents: DedicationContentsForeword by Dr. James RansomeForeword by Erv ComerPrefaceAcknowledgmentsAbout the AuthorsPart OneChapter 1 How We Got HereDamilare Fagbemi, Dave Wheeler, and JC WheelerChapter 2 The IoT Castle and Its Many GatesDamilare Fagbemi and Dave WheelerChapter 3 The IoT Security EconomyDamilare Fagbemi and Dave WheelerPart TwoChapter 4 Architecting IoT Systems That Scale SecurelyDave WheelerChapter 5 Security Architecture for Real IoT SystemsDave WheelerChapter 6 Securing the IoT CloudDamilare FagbemiChapter 7 Securely Connecting the UnconnectedDave WheelerChapter 8 Privacy, Pirates, and the Tale of a Smart CityJC WheelerChapter 9 Privacy Controls in an Age of Ultra-ConnectednessDave Wheeler and Damilare FagbemiChapter 10 Security Usability: Human, Computer, and Security InteractionDamilare FagbemiPart ThreeChapter 11 Earth 2040-Peeking at the FutureDamilare FagbemiEpilogueIndex

Abstract:

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."--Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."-- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."-- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."-- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1122923365> # The IoT Architect's Guide to Attainable Security and Privacy
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "1122923365" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/9621684376#Place/milton> ; # Milton
    schema:about <http://experiment.worldcat.org/entity/work/data/9621684376#Topic/computers_information_technology> ; # COMPUTERS--Information Technology
    schema:about <http://dewey.info/class/004.678/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9621684376#Topic/internet_of_things_security_measures> ; # Internet of things--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/9621684376#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/9621684376#Topic/internet_of_things> ; # Internet of things
    schema:about <http://experiment.worldcat.org/entity/work/data/9621684376#Topic/mathematics_general> ; # MATHEMATICS--General
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/9621684376#Person/wheeler_j_c> ; # J. C. Wheeler
    schema:contributor <http://experiment.worldcat.org/entity/work/data/9621684376#Person/wheeler_david_m> ; # David M. Wheeler
    schema:creator <http://experiment.worldcat.org/entity/work/data/9621684376#Person/fagbemi_damilare_d> ; # Damilare D. Fagbemi
    schema:datePublished "2019" ;
    schema:description "This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."--Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."-- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."-- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."-- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9621684376> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/9621684376#CreativeWork/iot_architect_s_guide_to_attainable_security_and_privacy> ;
    schema:name "The IoT Architect's Guide to Attainable Security and Privacy"@en ;
    schema:productID "1122923365" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1122923365#PublicationEvent/milton_auerbach_publishers_incorporated_2019> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/9621684376#Agent/auerbach_publishers_incorporated> ; # Auerbach Publishers, Incorporated
    schema:url <https://www.taylorfrancis.com/books/e/9780367440930> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5916597> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2265231> ;
    schema:workExample <http://worldcat.org/isbn/9781000762617> ;
    schema:workExample <http://worldcat.org/isbn/9780367440930> ;
    schema:workExample <http://worldcat.org/isbn/9781000762259> ;
    schema:workExample <http://worldcat.org/isbn/9781000762433> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1122923365> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9621684376#Agent/auerbach_publishers_incorporated> # Auerbach Publishers, Incorporated
    a bgn:Agent ;
    schema:name "Auerbach Publishers, Incorporated" ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Person/fagbemi_damilare_d> # Damilare D. Fagbemi
    a schema:Person ;
    schema:familyName "Fagbemi" ;
    schema:givenName "Damilare D." ;
    schema:name "Damilare D. Fagbemi" ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Person/wheeler_david_m> # David M. Wheeler
    a schema:Person ;
    schema:familyName "Wheeler" ;
    schema:givenName "David M." ;
    schema:name "David M. Wheeler" ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Person/wheeler_j_c> # J. C. Wheeler
    a schema:Person ;
    schema:familyName "Wheeler" ;
    schema:givenName "J. C." ;
    schema:name "J. C. Wheeler" ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Topic/computers_information_technology> # COMPUTERS--Information Technology
    a schema:Intangible ;
    schema:name "COMPUTERS--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Topic/internet_of_things> # Internet of things
    a schema:Intangible ;
    schema:name "Internet of things"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Topic/internet_of_things_security_measures> # Internet of things--Security measures
    a schema:Intangible ;
    schema:name "Internet of things--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9621684376#Topic/mathematics_general> # MATHEMATICS--General
    a schema:Intangible ;
    schema:name "MATHEMATICS--General"@en ;
    .

<http://worldcat.org/entity/work/data/9621684376#CreativeWork/iot_architect_s_guide_to_attainable_security_and_privacy>
    a schema:CreativeWork ;
    rdfs:label "IoT Architect's Guide to Attainable Security and Privacy." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1122923365> ; # The IoT Architect's Guide to Attainable Security and Privacy
    .

<http://worldcat.org/isbn/9780367440930>
    a schema:ProductModel ;
    schema:isbn "0367440938" ;
    schema:isbn "9780367440930" ;
    .

<http://worldcat.org/isbn/9781000762259>
    a schema:ProductModel ;
    schema:isbn "1000762254" ;
    schema:isbn "9781000762259" ;
    .

<http://worldcat.org/isbn/9781000762433>
    a schema:ProductModel ;
    schema:isbn "1000762432" ;
    schema:isbn "9781000762433" ;
    .

<http://worldcat.org/isbn/9781000762617>
    a schema:ProductModel ;
    schema:isbn "1000762610" ;
    schema:isbn "9781000762617" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.