Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

個数:
電子版価格
¥6,316
  • 電子版あり

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 592 p.
  • 言語 ENG
  • 商品コード 9781394349418
  • DDC分類 610.2854678

Full Description

A timely technical guide to securing network-connected medical devices

In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area.

Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices.

Inside the book:

Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology
Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security
Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks

Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.

Contents

Preface xxvii

Foreword xxix

Part I Foundation 1

Chapter 1 Introduction to IoMT in Healthcare 3

Chapter 2 The Evolving Landscape of Wireless Technologies in Medical Devices 23

Chapter 3 Introduction to Bluetooth and Wi-Fi in Healthcare 46

Part II Attack Vectors 65

Chapter 4 Bluetooth Vulnerabilities, Tools, and Mitigation Planning 67

Chapter 5 Wi-Fi and Other Wireless Protocol Vulnerabilities 104

Chapter 6 Man-in-the-Middle Attacks on Medical Devices 161

Chapter 7 Replay and Spoofing Attacks in IoMT 196

Chapter 8 Denial of Service in Wireless Medical Networks 208

Part III Case Studies and Real-World Scenarios 227

Chapter 9 Pacemaker Hacking 229

Chapter 10 Insulin Pump Vulnerabilities and Exploits 247

Chapter 11 Attack Vector Trends and Hospital Network Breaches with IoMT Devices 263

Part IV Detection and Prevention 295

Chapter 13 Intrusion Detection and Prevention for IoMT Networks 297

Chapter 14 Machine Learning Approaches to Wireless Attack Detection 338

Chapter 15 Secure Communication Protocols for Medical Devices 366

Chapter 16 Best Practices for IoMT Device Security 391

Part V Future Trends and Emerging Threats 441

Chapter 17 5G and Beyond and Implications for IoMT Security 443

Chapter 18 Quantum Computing in Medical Device Security 459

Chapter 19 AI-Driven Attacks and Defenses in Healthcare 476

Part VI Legal and Ethical Considerations 491

Chapter 20 Regulatory Frameworks for IoMT Security 493

Chapter 21 Guidelines for Ethical Hacking in Healthcare 510

Conclusion 525

Index 527

最近チェックした商品