000 | 04051nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-981-15-9942-2 | ||
003 | DE-He213 | ||
005 | 20240423125431.0 | ||
007 | cr nn 008mamaa | ||
008 | 210127s2021 si | s |||| 0|eng d | ||
020 |
_a9789811599422 _9978-981-15-9942-2 |
||
024 | 7 |
_a10.1007/978-981-15-9942-2 _2doi |
|
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aTang, Qinghao. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aInternet of Things Security: Principles and Practice _h[electronic resource] / _cby Qinghao Tang, Fan Du. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2021. |
|
300 |
_aIX, 288 p. 206 illus., 129 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPart 1 Basics and analysis methods for IoT System -- 1 The Analysis on Hardware -- 2 The Analysis on Wireless Communication -- 3 Basic Knowledge of Firmware -- 4 Analysis of Firmware Vulnerabilities -- Part 2 Defense methods for Industrial IoT System -- 5 IoT Security -- 6 IoT Security Solution. | |
520 | _aOver the past few years, Internet of Things has brought great changes to the world. Reports show that, the number of IoT devices is expected to reach 10 billion units within the next three years. The number will continue to rise and wildly use as infrastructure and housewares with each passing day, Therefore, ensuring the safe and stable operation of IoT devices has become more important for IoT manufacturers. Generally, four key aspects are involved in security risks when users use typical IoT products such as routers, smart speakers, and in-car entertainment systems, which are cloud, terminal, mobile device applications, and communication data. Security issues concerning any of the four may lead to the leakage of user sensitive data. Another problem is that most IoT devices are upgraded less frequently, which leads it is difficult to resolve legacy security risks in short term. In order to cope with such complex security risks,Security Companies in China, such as Qihoo 360, Xiaomi, Alibaba and Tencent, and companies in United States, e.g. Amazon, Google, Microsoft and some other companies have invested in security teams to conduct research and analyses, the findings they shared let the public become more aware of IoT device security-related risks. Currently, many IoT product suppliers have begun hiring equipment evaluation services and purchasing security protection products. As a direct participant in the IoT ecological security research project, I would like to introduce the book to anyone who is a beginner that is willing to start the IoT journey, practitioners in the IoT ecosystem, and practitioners in the security industry. This book provides beginners with key theories and methods for IoT device penetration testing; explains various tools and techniques for hardware, firmware and wireless protocol analysis; and explains how to design a secure IoT device system, while providing relevant code details. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aInternet of things. | |
650 | 1 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aInternet of Things. |
700 | 1 |
_aDu, Fan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811599415 |
776 | 0 | 8 |
_iPrinted edition: _z9789811599439 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-9942-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177891 _d177891 |