IoTの脆弱性と復旧戦略<br>Internet of Things Vulnerabilities and Recovery Strategies

個数:

IoTの脆弱性と復旧戦略
Internet of Things Vulnerabilities and Recovery Strategies

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 344 p.
  • 言語 ENG
  • 商品コード 9781032473314
  • DDC分類 004.6

Full Description

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT's broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:

Data Routing
Data Integrity
Device Supervision
IoT Integration
Information Storage
IoT Performance

The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

Contents

1. The Internet of Things (IoT): A Cripple to Data Privacy and Security 2. Cyber-Physical Threat Intelligence for IoT Using Machine Learning 3. Privacy Preservation in Cyber Physical Systems Using Entropy-Based Techniques 4. Securing IoT Environment Using Bio-Inspired Meta-Heuristic Methodologies 5. Security of IoT and Its Solutions 6. A Gradational Approach for Auditing IoT Security Vulnerability: Case Study of Smart Home Devices 7. Managing and Securing Information Storage in Internet of Things 8. Mitigation of Internet of Things: Cloud Security Challenges by Using Adaptive Security Principles 9. IoT Security with Blockchain Technology in the Financial Sector 10. Self-Adaptive Cyber-Physical Systems in IoT 11. Internet of Things: Security and Privacy Issues in IoT and Its Solutions 12. The Dark Side of Internet of Things in E-Commerce: Uncovering the Misuse of Personal Information 13. Intrusion Detection in Home Automation in IoT 14. IoT Performance Assessment 15. Case Studies on IoT Systems Performance Analysis 16. Privacy and Security Issues in Smart Homes in an IoT 17. Enhancing Security: Detecting Intrusions in IoT-Based Home Automation

最近チェックした商品