A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
Key Features:
Book Description:
With the advent of Internet of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.
This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.
What You Will Learn:
Who this book is for:
This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful.
"synopsis" may belong to another edition of this title.
Brian Russell is a Chief Engineer focused on Cyber Security Solutions for Leidos. He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers, with a focus on a secure Internet of Things (IoT). Brian leads efforts that include security engineering for Unmanned Aerial Systems (UAS) and Connected Vehicles, next- generation energy systems (microgrids), and the development of cryptographic key management systems. He has 16 years of cyber security experience and supports the Center for Internet Security (CIS) as a member of the 20 Critical Security Controls Editorial Panel. Brian also serves as Chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, is a member of the Federal Communications Commission (FCC) Technological Advisory Council (TAC) Cyber Security Working Group for IoT, and is a contributor to the Securing Smart Cities Initiative.
Drew Van Duren is a senior cryptographic and cybersecurity engineer at Leidos, highlighting 15 years of support to commercial, Department of Defense (DoD), Intelligence, and Department of Transportation (USDOT) customers in their efforts to secure vital national systems. Originally an aeronautical engineer, his experience evolved into cyber-physical (transportation system) risk management, secure cryptographic communications design, as well as software and network engineering analysis/design for cryptographic network protocols. He has performed extensive UAS risk/threat modeling, has security mitigation expertise in the FAA Unmanned Air System (UAS) integration office, and, in conjunction with the RTCA, developed cryptographic security requirements for unmanned aircraft planning to operate in the US National Airspace System (NAS). He has also supported USDOT and the automotive industry in threat modeling and security/conformance testing for Connected Vehicle operations and systems, culminating in recommended design modifications for the largest anticipated public key infrastructure (PKI) in the world: the Connected Vehicles Security Credential Management System (SCMS). Drew has managed the largest FIPS 140-2 (cryptographic module) cryptographic testing laboratories; directed and performed extensive cryptographic security engineering and designed system architectures for high-assurance DoD systems; directed large PKI and key management engineering efforts; and has led multiple software development and interoperability test programs. He continues to interface with standards bodies such as the National Institutes for Standards and Technology (NIST) Cryptographic Module Validation Program (CMVP) and the US Department of Transportation and RTCA; he also provides ongoing security analysis and cybersecurity best practices engineering expertise to the US Government.
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. Used book that is in clean, average condition without any missing pages. Seller Inventory # 14213266-6
Quantity: 1 available
Seller: Phatpocket Limited, Waltham Abbey, HERTS, United Kingdom
Condition: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Seller Inventory # Z1-F-060-01350
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00088000042
Quantity: 1 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: Good. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 002007242U
Quantity: 4 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: New. Ships same day or next business day! UPS shipping available (Priority Mail for AK/HI/APO/PO Boxes). Used sticker and some writing and/or highlighting. Used books may not include working access code. Used books will not include dust jackets. Seller Inventory # 002007242N
Quantity: 15 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. Seller Inventory # 26772333-5
Quantity: 4 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 26772333-n
Quantity: 9 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2912160171034
Quantity: Over 20 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Practical Internet of Things Security 1.27. Book. Seller Inventory # BBS-9781785889639
Quantity: 5 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781785889639
Quantity: Over 20 available