Электронная книга: Tyson Brooks T. «Cyber-Assurance for the Internet of Things»

Cyber-Assurance for the Internet of Things

Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications Aids readers in understanding how to design and build cyber-assurance into the IoT Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.

Издательство: "John Wiley&Sons Limited"

ISBN: 9781119193883

электронная книга

Купить за 9652.07 руб и скачать на Litres

Look at other dictionaries:

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Business and Industry Review — ▪ 1999 Introduction Overview        Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… …   Universalium

  • Deep configuration assessment — Large, dynamic and complex IP networks are increasingly being used for real time and critical services. To provide service assurance in such networks, deep configuration assessment is a new approach that is being discussed in the recent… …   Wikipedia

  • PlayStation 3 — PS3 redirects here. For other uses, see PS3 (disambiguation). PlayStation 3 …   Wikipedia

  • Talmud — Rabbinic Literature Talmudic literature Mishnah • Tosefta Jerusalem Talmud • Babylonian Talmud Minor tractates Halakhic Midrash Mekhilta de Rabbi Yishmael (Exodus) Mekhilta de Rabbi Shimon (Exodus) Sifra (Leviticus) Sifre (Numbers Deuteronomy) …   Wikipedia

  • University of Pretoria — Infobox University name = University of Pretoria native name = Universiteit van Pretoria motto = Ad Destinatum Persequor Pursuing towards destiny established = 1908 type = Public university staff = 4 099 (fulltime appointments) head label = Vice… …   Wikipedia

  • Prowl (Transformers) — Prowl is the name of several fictional characters in the Transformers universes. After Optimus Prime and Megatron, and along with Mirage, Starscream, and Ironhide, Prowl is one of the most re used American names in the assorted Transformers… …   Wikipedia

  • De La Salle-Santiago Zobel School — Infobox Secondary school name = native name = Paaralang De La Salle Santiago Zobel motto = Religio Mores Cultura Christian Achievers for God and Country established = 1978 city = Muntinlupa state = Metro Manila province = country = Philippines… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.