Practical Internet of Things Security

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Practical Internet of Things Security by Brian Russell, Drew Van Duren, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Brian Russell, Drew Van Duren ISBN: 9781785880292
Publisher: Packt Publishing Publication: June 29, 2016
Imprint: Packt Publishing Language: English
Author: Brian Russell, Drew Van Duren
ISBN: 9781785880292
Publisher: Packt Publishing
Publication: June 29, 2016
Imprint: Packt Publishing
Language: English

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

About This Book

  • Learn to design and implement cyber security strategies for your organization
  • Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem
  • Learn best practices to secure your data from device to the cloud
  • Gain insight into privacy-enhancing techniques and technologies

Who This Book Is For

This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.

What You Will Learn

  • Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments
  • Build a rock-solid security program for IoT that is cost-effective and easy to maintain
  • Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture
  • See how the selection of individual components can affect the security posture of the entire system
  • Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem
  • Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future.

In Detail

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.

This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.

Style and approach

This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

About This Book

Who This Book Is For

This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.

What You Will Learn

In Detail

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.

This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.

Style and approach

This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.

More books from Packt Publishing

Cover of the book Microsoft Operations Management Suite Cookbook by Brian Russell, Drew Van Duren
Cover of the book Mastering Qlik Sense by Brian Russell, Drew Van Duren
Cover of the book JBoss AS 7 Configuration, Deployment and Administration by Brian Russell, Drew Van Duren
Cover of the book Mastering Data Analysis with R by Brian Russell, Drew Van Duren
Cover of the book Learning Apache Mahout Classification by Brian Russell, Drew Van Duren
Cover of the book Scratch 2.0 Game Development - HOTSHOT by Brian Russell, Drew Van Duren
Cover of the book Learning pandas - Second Edition by Brian Russell, Drew Van Duren
Cover of the book Mastering Spring 5.0 by Brian Russell, Drew Van Duren
Cover of the book Learning iOS 8 Game Development Using Swift by Brian Russell, Drew Van Duren
Cover of the book Troubleshooting CentOS by Brian Russell, Drew Van Duren
Cover of the book JasperReports 3.5 for Java Developers by Brian Russell, Drew Van Duren
Cover of the book Bash Quick Start Guide by Brian Russell, Drew Van Duren
Cover of the book Beginning C# 7 Hands-On – The Core Language by Brian Russell, Drew Van Duren
Cover of the book MDX with Microsoft SQL Server 2016 Analysis Services Cookbook - Third Edition by Brian Russell, Drew Van Duren
Cover of the book Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide by Brian Russell, Drew Van Duren
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy