000 03653cam a2200649Ii 4500
001 ocn958936667
003 OCoLC
005 20190328114816.0
006 m o d
007 cr cnu|||unuuu
008 160922s2017 mau o 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dOPELS
_dOCLCO
_dIDEBK
_dOCLCO
_dTEFOD
_dOCLCO
_dYDX
_dOCLCO
_dQCL
_dUPM
_dS4S
_dOCLCQ
_dU3W
_dD6H
_dOCLCF
_dBRX
019 _a960895214
_a965413088
020 _a9780124199903
_q(electronic bk.)
020 _a0124199909
_q(electronic bk.)
020 _z9780124199712
035 _a(OCoLC)958936667
_z(OCoLC)960895214
_z(OCoLC)965413088
050 4 _aQA76.5915
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a004.67/8
_223
100 1 _aMacaulay, Tyson,
_eauthor.
245 1 0 _aRIoT control : understanding and managing risks and the internet of things /
_h[electronic resource]
_cTyson Macaulay.
264 1 _aCambridge, MA :
_bMorgan Kaufmann,
_c2017.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aVendor-supplied metadata.
520 _aRIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
504 _aIncludes bibliographical references and index.
650 0 _aInternet of things
_xManagement.
650 0 _aUbiquitous computing.
650 0 _aEmbedded Internet devices.
650 0 _aInternet
_xSecurity measures.
650 7 _aCOMPUTERS / Computer Literacy
_2bisacsh
650 7 _aCOMPUTERS / Computer Science
_2bisacsh
650 7 _aCOMPUTERS / Data Processing
_2bisacsh
650 7 _aCOMPUTERS / Hardware / General
_2bisacsh
650 7 _aCOMPUTERS / Information Technology
_2bisacsh
650 7 _aCOMPUTERS / Machine Theory
_2bisacsh
650 7 _aCOMPUTERS / Reference
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aEmbedded Internet devices.
_2fast
_0(OCoLC)fst01742162
650 7 _aInternet
_xSecurity measures.
_2fast
_0(OCoLC)fst01751426
650 7 _aUbiquitous computing.
_2fast
_0(OCoLC)fst01160283
655 4 _aElectronic books.
655 7 _aElectronic books.
_2local
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780124199712
999 _c247425
_d247425