語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Internet of Things Security: Princip...
~
Tang, Qinghao.
Internet of Things Security: Principles and Practice
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Internet of Things Security: Principles and Practice/ by Qinghao Tang, Fan Du.
作者:
Tang, Qinghao.
其他作者:
Du, Fan.
面頁冊數:
IX, 288 p. 206 illus., 129 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-981-15-9942-2
ISBN:
9789811599422
Internet of Things Security: Principles and Practice
Tang, Qinghao.
Internet of Things Security: Principles and Practice
[electronic resource] /by Qinghao Tang, Fan Du. - 1st ed. 2021. - IX, 288 p. 206 illus., 129 illus. in color.online resource.
Part 1 Basics and analysis methods for IoT System -- 1 The Analysis on Hardware -- 2 The Analysis on Wireless Communication -- 3 Basic Knowledge of Firmware -- 4 Analysis of Firmware Vulnerabilities -- Part 2 Defense methods for Industrial IoT System -- 5 IoT Security -- 6 IoT Security Solution.
Over the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks,Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they shared let the public become more aware of IoT device security-related risks. Currently, many IoT product suppliers have begun hiring equipment evaluation services and purchasing security protection products. As a direct participant in the IoT ecological security research project, I would like to introduce the book to anyone who is a beginner that is willing to start the IoT journey, practitioners in the IoT ecosystem, and practitioners in the security industry. This book provides beginners with key theories and methods for IoT device penetration testing; explains various tools and techniques for hardware, firmware and wireless protocol analysis; and explains how to design a secure IoT device system, while providing relevant code details.
ISBN: 9789811599422
Standard No.: 10.1007/978-981-15-9942-2doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Internet of Things Security: Principles and Practice
LDR
:03525nam a22003855i 4500
001
1052461
003
DE-He213
005
20210623205150.0
007
cr nn 008mamaa
008
220103s2021 si | s |||| 0|eng d
020
$a
9789811599422
$9
978-981-15-9942-2
024
7
$a
10.1007/978-981-15-9942-2
$2
doi
035
$a
978-981-15-9942-2
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Tang, Qinghao.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1357193
245
1 0
$a
Internet of Things Security: Principles and Practice
$h
[electronic resource] /
$c
by Qinghao Tang, Fan Du.
250
$a
1st ed. 2021.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
IX, 288 p. 206 illus., 129 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part 1 Basics and analysis methods for IoT System -- 1 The Analysis on Hardware -- 2 The Analysis on Wireless Communication -- 3 Basic Knowledge of Firmware -- 4 Analysis of Firmware Vulnerabilities -- Part 2 Defense methods for Industrial IoT System -- 5 IoT Security -- 6 IoT Security Solution.
520
$a
Over the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks,Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they shared let the public become more aware of IoT device security-related risks. Currently, many IoT product suppliers have begun hiring equipment evaluation services and purchasing security protection products. As a direct participant in the IoT ecological security research project, I would like to introduce the book to anyone who is a beginner that is willing to start the IoT journey, practitioners in the IoT ecosystem, and practitioners in the security industry. This book provides beginners with key theories and methods for IoT device penetration testing; explains various tools and techniques for hardware, firmware and wireless protocol analysis; and explains how to design a secure IoT device system, while providing relevant code details.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer engineering.
$3
569006
650
0
$a
Internet of things.
$3
1023130
650
0
$a
Embedded computer systems.
$3
562313
650
0
$a
Computer software.
$3
528062
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cyber-physical systems, IoT.
$3
1226036
650
2 4
$a
Professional Computing.
$3
1115983
700
1
$a
Du, Fan.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1193673
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811599415
776
0 8
$i
Printed edition:
$z
9789811599439
856
4 0
$u
https://doi.org/10.1007/978-981-15-9942-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入