IUKL Library

Lifecycle IoT Security for Engineers. (Record no. 319822)

000 -LEADER
fixed length control field 04375nam a22004453i 4500
001 - CONTROL NUMBER
control field EBC6805253
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20221230093425.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221228s2021 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781630818043
Qualifying information (electronic bk.)
Cancelled/invalid ISBN 9781630818036
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC6805253
System control number (Au-PeEL)EBL6805253
System control number (OCoLC)1288210815
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.8857
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kaustubh, Dhondge.
245 10 - TITLE STATEMENT
Title Lifecycle IoT Security for Engineers.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 -
-- Norwood :
-- Artech House,
-- 2021.
-- �2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (219 pages)
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Lifecycle IoT Security for Engineers -- Contents -- Foreword -- Preface -- Acknowledgments -- 1 Introduction to IoT and Its Applications -- 1.1 Defining the IoT -- 1.2 Classifying Industrial, Enterprise, and Consumer IoT Applications -- 1.3 Why IoT Needs Securing -- 1.4 Summary -- References -- 2 Lifecycle of IoT Security -- 2.1 IoT Security Implementation -- 2.2 Integrating the Security Measures into IoT Services -- 2.3 Operation of the IoT Services -- 2.4 Maintaining the IoT Infrastructure -- 2.5 Planned Degradation and Discontinuation of the IoT Services -- 2.6 Summary -- References -- 3 Vulnerabilities in IoT Security -- 3.1 Insufficient Physical Hardening -- 3.2 Insecure Cloud and Network Services -- 3.3 Device-Level Vulnerabilities and Mismanagements -- 3.4 Poor Password Practices and Identity Management -- 3.5 Inappropriate Cryptographic Measures -- 3.6 Weak Update Protocols -- 3.7 Summary -- References -- 4 IoT Security Attack Vectors and Actors -- 4.1 Understanding the Motivations to Attack IoT Systems -- 4.2 Actors Involved in IoT Security and Attacks -- 4.3 IoT Device-Level Attacks -- 4.4 IoT Network Attacks -- 4.5 Cloud Service Attacks -- 4.6 Summary -- References -- 5 Preventive and Defensive Measures to Counter IoT Security Threats -- 5.1 Secure by Design -- 5.2 IoT Device-Level Security -- 5.3 IoT Network Security -- 5.4 Cloud Service Security -- 5.5 Summary -- 6 Detection and Identification of IoT Security Attacks -- 6.1 Setting Up IoT Security Incident Protocols -- 6.2 Establishing Security Incident Response Teams -- 6.3 Monitoring and Penetrating IoT Services -- 6.4 Summary -- References -- 7 Practical Challenges in Implementing Appropriate Level of Security -- 7.1 Challenges of Inherent Heterogeneity -- 7.2 Interoperability Between Diverse Stakeholders -- 7.3 The Human Factor Forming a Weak Link in IoT Security.
Formatted contents note 7.4 Commercial and Performance-Oriented Factors -- 7.5 Summary -- References -- 8 Regulatory Guidance for the IoT Industry -- 8.1 Need for Regulatory Guidance on IoT Security and Its Global Directions -- 8.2 Internet Research Task Force Request for Comments 8576 -- 8.3 U.S. NIST Interagency/Internal Report 8259 and 8259A -- 8.4 ETSI TS 103 645 -- 8.5 Summary -- References -- 9 Social and Commercial Impacts of IoT Security Failures -- 9.1 Large-Scale Impact of IoT Services -- 9.2 Unavailability of Life-Saving Services -- 9.3 Loss of Privacy and Personal Data -- 9.4 Degraded Consumer Confidence -- 9.5 Threat to Critical Infrastructure and National Security -- 9.6 Commercial Impacts and Losses -- 9.7 Summary -- References -- 10 Recovering from IoT Security Incidents -- 10.1 Incident Containment -- 10.2 Security Threat Redressal -- 10.3 Patching Security Updates -- 10.4 Communicating with the Stakeholders -- 10.5 Summary -- References -- About the Author -- Index.
588 ## -
-- Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2022. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet of things--Security measures.
Topical term or geographic name as entry element Computer security.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Kaustubh, Dhondge
Title Lifecycle IoT Security for Engineers
Place, publisher, and date of publication Norwood : Artech House,c2021
International Standard Book Number 9781630818036
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-book
Holdings
Withdrawn status Lost status Damaged status Not for loan Date acquired Date last seen Uniform Resource Identifier Price effective from Koha item type Source of classification or shelving scheme Collection code Permanent Location Current Location Source of acquisition Copy number
        2022-12-30 2022-12-30 https://ebookcentral.proquest.com/lib/kliuc-ebooks/detail.action?docID=6805253 2022-12-30 E-book            
        2022-12-30 2022-12-30   2022-12-30 E-book     IUKL Library IUKL Library Access Dunia 1
The Library's homepage is at http://library.iukl.edu.my/.