Lifecycle IoT security for engineers /Kaustubh Dhondge. (Record no. 80690)

MARC details
000 -LEADER
fixed length control field 02939cam a2200325Ii 4500
001 - CONTROL NUMBER
control field on1286429132
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726104845.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211127s2021 xx o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency EBLCP
Modifying agency IEEEE
-- NT
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781630818043
Qualifying information
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105
Item number .L544 2021
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Dhondge, Kaustubh,
Relator term Author
245 10 - TITLE STATEMENT
Title Lifecycle IoT security for engineers /Kaustubh Dhondge.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (219 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographies and index.
520 0# - SUMMARY, ETC.
Summary, etc. This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way.   IoT and the diverse and unique nature of IoT applications across the commercial and industrial landscape, are introduced, including the need for securing IoT. The lifecycle of IoT security, specifically the security implementations that need to be carried out at various stages in the operational process of an IoT service are presented, as well as the security requirements during the planning, security integration, operational, maintenance, and planned discontinuation phase of an IoT service. The vulnerabilities in IoT, the various attack vectors exploited by attackers, and preventive measures that can be undertaken to avoid these security attacks are also explored.   Readers are acclimated with various steps that must be undertaken to prepare for IoT security attacks, and techniques that can be employed to detect them. Key challenges involved with implementing appropriate levels of security in IoT due to heterogeneity, interoperability, human errors, and commercial factors are discussed, as well as the need for regulatory guidance for the IoT industry and highlights specific examples of regulations in leading markets across the globe.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Security measures.
655 #1 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic Books.
856 40 - ELECTRONIC LOCATION AND ACCESS
-- Click to access digital title | log in using your CIU ID number and my.ciu.edu password.
Uniform Resource Identifier <a href="httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3099627&site=eds-live&custid=s3260518">httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3099627&site=eds-live&custid=s3260518</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
DONATED BY:
VENDOR EBSCO
Classification part TK.
PUBLICATION YEAR 2021
LOCATION ONLINE
REQUESTED BY:
--
-- NFIC
Source of classification or shelving scheme
994 ## -
-- 92
-- NT
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library ONLINE 07/07/2023 EBSCO   TK5105.8857 on1286429132 07/07/2023 httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3099627&site=eds-live&custid=s3260518 07/07/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)