David M. Wheeler - The IoT Architects Guide to Attainable Security and Privacy
Here you can read online David M. Wheeler - The IoT Architects Guide to Attainable Security and Privacy full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Auerbach Publications, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:The IoT Architects Guide to Attainable Security and Privacy
- Author:
- Publisher:Auerbach Publications
- Genre:
- Year:2019
- Rating:3 / 5
- Favourites:Add to favourites
- Your mark:
The IoT Architects Guide to Attainable Security and Privacy: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "The IoT Architects Guide to Attainable Security and Privacy" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
We wrote this book not only to be a valuable security and IoT architectural resource for you but also to be an enjoyable read. With that in mind, weve added personal experiences, scenarios, and examples designed to draw you in and keep you engaged.
Who Will Benefit Most from This Book?If you have a vested interest in IoT systems that preserve security and uphold privacy, this book is for you. The primary beneficiaries are IoT architects (security, system, software, or solution architects), and IoT strategic marketing. Executive managers and policy makers will also benefit from its insights.
Topics at a Glance
- The fundamental components of an IoT system.
- The architecture of IoT systems, how they differ from other client-server and cloudbased systems, and why are they architected the way they are.
- The security-mindset and secure design principles required to build secure systems and communicate effectively with customers, architects, and designers.
- The motivation and methods of cybercriminals.
- The IoT Security Economy, dark web, dark money, and digital currency.
- IoT attack vectors--how IoT systems are attacked.
- How to perform a threat analysis and construct countermeasures to protect a system, whether that is an IoT, cloud, or some other system--including detailed examples.
- A broad survey of common and not-so-common IoT communications protocols, and the roles of wired and wireless communications in IoT system.
- How to perform a protocol analysis--analyzing a protocol for security and finding security vulnerabilities in protocols, including a detailed example.
- Artificial Intelligence and Digital Privacy--the privacy impacts of combining AI and IoT; featuring scenarios for an autonomous vehicle ecosystem and smart refrigerator.
- Digital privacy laws and regulations and how they impact IoT architectures.
- A Privacy Playbook to mitigate unnecessary exposure of personal data.
- Designing Usable IoT Security--principles for building user-friendly security controls into IoT systems.
- The future evolution of the Internet of Things and AI, the impact on our lives, the security consequences we must prevent . . . starting now, and the responsibilities we all share.
David M. Wheeler: author's other books
Who wrote The IoT Architects Guide to Attainable Security and Privacy? Find out the surname, the name of the author of the book and a list of all author's works by series.