Feedback

X
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment

Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment

1 Ungluer has Faved this Work

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 1797 times via unglue.it ebook links.
  1. 1046 - pdf (CC BY) at OAPEN Library.
  2. 229 - mobi (CC BY) at Unglue.it.
  3. 154 - pdf (CC BY) at Unglue.it.
  4. 340 - epub (CC BY) at Unglue.it.

Keywords

  • Architects
  • Business & management
  • Business mathematics & systems
  • Business—Data processing
  • Computer communication systems
  • computer hardware
  • Computer science
  • Computer security
  • Computing & information technology
  • developers
  • Device connectivity
  • Economics, finance, business & management
  • Information technology
  • Intel
  • Internet of Things
  • IoT
  • IoT Frameworks
  • Network hardware
  • security
  • Software Security
  • Strategists

Links

DOI: 10.1007/978-1-4842-2896-8
web: https://link.springer.com/book/10.1007/978-1-4842-2896-8

Editions

edition cover
edition cover

Share

Copy/paste this into your site: