MARC details
000 -LEADER |
fixed length control field |
04507nam a2200673 i 4500 |
001 - CONTROL NUMBER |
control field |
9781948976657 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BEP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241023114913.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190417s2019 nyua fob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781948976657 |
Qualifying information |
|
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1106359617 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)slc73515993 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.875.I57 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Adaros Boye, Carolina A., |
Relator term |
|
245 10 - TITLE STATEMENT |
Title |
Understanding cyberrisks in IoT : |
Remainder of title |
when smart things turn against you / |
Statement of responsibility, etc. |
Carolina A. Adaros Boye. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York, New York (222 East 46th Street, New York, NY 10017) : |
Name of producer, publisher, distributor, manufacturer |
Business Expert Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[(c)2019.] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (vi, 128 pages) : |
Other physical details |
color illustrations |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Business Expert Press Business law and corporate risk management collection, |
ISBN |
2333-6730 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
|
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1. Introduction - What Is IoT? -- |
Title |
Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you -- |
-- |
Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation -- |
-- |
Chapter 4. Why is IoT especially vulnerable? Requirements and challenges -- |
-- |
Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests -- |
-- |
Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 -- |
-- |
Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff -- |
-- |
Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong -- |
-- |
Chapter 9. Lessons learned - getting a better idea about how to handle the risks -- |
-- |
Chapter 10. Conclusions - now what do I do with this information? |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Access restricted to authorized users and institutions. |
520 3# - SUMMARY, ETC. |
Summary, etc. |
As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
|
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat reader. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Description based on PDF viewed 05/29/2019. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Internet of things |
General subdivision |
Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Risk management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Privacy, Right of. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
IoT (Internet of things) |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
IIoT (Industrial Internet of things) |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Cybersecurity. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Risks. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Industrial control systems. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Cyberattack. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Vulnerability. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Threat. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Availability. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Integrity. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Privacy. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Confidentiality. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Cyber-awareness. |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
[genre] |
655 #0 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781948976640 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Business Expert Press Business law and corporate risk management collection. |
International Standard Serial Number |
2333-6730 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Usage before 2021-2022 |
CIU |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
VENDOR |
Business Expert Press |
LOCATION |
ONLINE |
Barecode |
BEP9781948976657 |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
c |
1 |
d |
Cynthia Snell |