000 -LEADER |
fixed length control field |
04375nam a22004453i 4500 |
001 - CONTROL NUMBER |
control field |
EBC6805253 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20221230093425.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
221228s2021 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781630818043 |
Qualifying information |
(electronic bk.) |
|
Cancelled/invalid ISBN |
9781630818036 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(MiAaPQ)EBC6805253 |
|
System control number |
(Au-PeEL)EBL6805253 |
|
System control number |
(OCoLC)1288210815 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
MiAaPQ |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
MiAaPQ |
Modifying agency |
MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.8857 |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.678 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kaustubh, Dhondge. |
245 10 - TITLE STATEMENT |
Title |
Lifecycle IoT Security for Engineers. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. |
264 #1 - |
-- |
Norwood : |
-- |
Artech House, |
-- |
2021. |
|
-- |
�2021. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (219 pages) |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Lifecycle IoT Security for Engineers -- Contents -- Foreword -- Preface -- Acknowledgments -- 1 Introduction to IoT and Its Applications -- 1.1 Defining the IoT -- 1.2 Classifying Industrial, Enterprise, and Consumer IoT Applications -- 1.3 Why IoT Needs Securing -- 1.4 Summary -- References -- 2 Lifecycle of IoT Security -- 2.1 IoT Security Implementation -- 2.2 Integrating the Security Measures into IoT Services -- 2.3 Operation of the IoT Services -- 2.4 Maintaining the IoT Infrastructure -- 2.5 Planned Degradation and Discontinuation of the IoT Services -- 2.6 Summary -- References -- 3 Vulnerabilities in IoT Security -- 3.1 Insufficient Physical Hardening -- 3.2 Insecure Cloud and Network Services -- 3.3 Device-Level Vulnerabilities and Mismanagements -- 3.4 Poor Password Practices and Identity Management -- 3.5 Inappropriate Cryptographic Measures -- 3.6 Weak Update Protocols -- 3.7 Summary -- References -- 4 IoT Security Attack Vectors and Actors -- 4.1 Understanding the Motivations to Attack IoT Systems -- 4.2 Actors Involved in IoT Security and Attacks -- 4.3 IoT Device-Level Attacks -- 4.4 IoT Network Attacks -- 4.5 Cloud Service Attacks -- 4.6 Summary -- References -- 5 Preventive and Defensive Measures to Counter IoT Security Threats -- 5.1 Secure by Design -- 5.2 IoT Device-Level Security -- 5.3 IoT Network Security -- 5.4 Cloud Service Security -- 5.5 Summary -- 6 Detection and Identification of IoT Security Attacks -- 6.1 Setting Up IoT Security Incident Protocols -- 6.2 Establishing Security Incident Response Teams -- 6.3 Monitoring and Penetrating IoT Services -- 6.4 Summary -- References -- 7 Practical Challenges in Implementing Appropriate Level of Security -- 7.1 Challenges of Inherent Heterogeneity -- 7.2 Interoperability Between Diverse Stakeholders -- 7.3 The Human Factor Forming a Weak Link in IoT Security. |
|
Formatted contents note |
7.4 Commercial and Performance-Oriented Factors -- 7.5 Summary -- References -- 8 Regulatory Guidance for the IoT Industry -- 8.1 Need for Regulatory Guidance on IoT Security and Its Global Directions -- 8.2 Internet Research Task Force Request for Comments 8576 -- 8.3 U.S. NIST Interagency/Internal Report 8259 and 8259A -- 8.4 ETSI TS 103 645 -- 8.5 Summary -- References -- 9 Social and Commercial Impacts of IoT Security Failures -- 9.1 Large-Scale Impact of IoT Services -- 9.2 Unavailability of Life-Saving Services -- 9.3 Loss of Privacy and Personal Data -- 9.4 Degraded Consumer Confidence -- 9.5 Threat to Critical Infrastructure and National Security -- 9.6 Commercial Impacts and Losses -- 9.7 Summary -- References -- 10 Recovering from IoT Security Incidents -- 10.1 Incident Containment -- 10.2 Security Threat Redressal -- 10.3 Patching Security Updates -- 10.4 Communicating with the Stakeholders -- 10.5 Summary -- References -- About the Author -- Index. |
588 ## - |
-- |
Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) |
Local note |
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet of things--Security measures. |
|
Topical term or geographic name as entry element |
Computer security. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Print version: |
Main entry heading |
Kaustubh, Dhondge |
Title |
Lifecycle IoT Security for Engineers |
Place, publisher, and date of publication |
Norwood : Artech House,c2021 |
International Standard Book Number |
9781630818036 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) |
Corporate name or jurisdiction name as entry element |
ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Click to View |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-book |