The Internet of Things (Io T) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of Io T’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on Io T systems and solutions to prevent such attacks. Examining the requirements to secure Io T- systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision Io T Integration Information Storage Io T Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant Io T devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to Io T systems and device maintenance.
Alwi Bamhdi & Majid Ahmad Charoo
Internet of Things Vulnerabilities and Recovery Strategies [PDF ebook]
Internet of Things Vulnerabilities and Recovery Strategies [PDF ebook]
购买此电子书可免费获赠一本!
语言 英语 ● 格式 PDF ● 网页 360 ● ISBN 9781040025628 ● 编辑 Alwi Bamhdi & Majid Ahmad Charoo ● 出版者 CRC Press ● 发布时间 2024 ● 下载 3 时 ● 货币 EUR ● ID 9496757 ● 复制保护 Adobe DRM
需要具备DRM功能的电子书阅读器