Securing Smart Things (Paperback)
Massimo Nardone
Sold by Grand Eagle Retail, Bensenville, IL, U.S.A.
AbeBooks Seller since October 12, 2005
New - Soft cover
Condition: New
Ships within U.S.A.
Quantity: 1 available
Add to basketSold by Grand Eagle Retail, Bensenville, IL, U.S.A.
AbeBooks Seller since October 12, 2005
Condition: New
Quantity: 1 available
Add to basketPaperback. As the Internet of Things (IoT) continues to reshape industriesfrom smart homes and healthcare to manufacturing and mobilitythe need for robust, real-world security solutions has never been more urgent. This book is a hands-on guide to understanding and implementing practical IoT security strategies.This accessible introduction goes beyond theory to focus on what matters most: protecting connected devices, securing networks, and ensuring data integrity across complex ecosystems. The book shows how to identify vulnerabilities, mitigate risks, and apply proven techniques to safeguard everything from consumer gadgets to industrial systems.Whether you're deploying smart sensors in a factory or managing a fleet of connected medical devices, this book equips you with the tools and knowledge to build secure, resilient IoT systemstoday and into the future.You Will Learn To:Harden IoT devices against common attack vectorsSecure communication channels and network infrastructureProtect the IoT supply chain from end to endStrengthen data privacy and meet compliance requirementsWho Is This Book ForBeginner-to-intermediate-level practitioners of IoT security environment would benefit from this book. The book assumes you have a general understanding of the IT/OT Security environment and will be great for those who wish to learn the major differences between IT, OT, and IoT Security. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller Inventory # 9798868823664
As the Internet of Things (IoT) continues to reshape industries—from smart homes and healthcare to manufacturing and mobility—the need for robust, real-world security solutions has never been more urgent. This book is a hands-on guide to understanding and implementing practical IoT security strategies.
This accessible introduction goes beyond theory to focus on what matters most: protecting connected devices, securing networks, and ensuring data integrity across complex ecosystems. The book shows how to identify vulnerabilities, mitigate risks, and apply proven techniques to safeguard everything from consumer gadgets to industrial systems.
Whether you're deploying smart sensors in a factory or managing a fleet of connected medical devices, this book equips you with the tools and knowledge to build secure, resilient IoT systems—today and into the future.
You Will Learn To:
Who Is This Book For
Beginner-to-intermediate-level practitioners of IoT security environment would benefit from this book. The book assumes you have a general understanding of the IT/OT Security environment and will be great for those who wish to learn the major differences between IT, OT, and IoT Security.
Massimo Nardone has more than 30 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He holds an M.Sc. degree in computing science from the University of Salerno, Italy.
Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc. In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.
He is currently working as Vice President of OT Security for SSH Communications Security.
He is an Apress co-author of numerous books, including Spring Security 6 Recipes, Secure RESTful APIs, Cybersecurity Threats and Attacks in the Gaming Industry, Pro Spring Security, Beginning EJB in Java EE 8, Pro JPA 2 in Java EE 8 , Pro Android Games, and has reviewed more than 100 titles.
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it¿s described on the Abebooks web sites. If you¿ve changed
your mind about a book that you¿ve ordered, please use the Ask bookseller a question link to contact us
and we¿ll respond within 2 business days.
Books ship from California and Michigan.
Orders usually ship within 2 business days. All books within the US ship free of charge. Delivery is 4-14 business days anywhere in the United States.
Books ship from California and Michigan.
If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.
| Order quantity | 6 to 16 business days | 6 to 14 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.