000 | 03653cam a2200649Ii 4500 | ||
---|---|---|---|
001 | ocn958936667 | ||
003 | OCoLC | ||
005 | 20190328114816.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 160922s2017 mau o 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dOPELS _dOCLCO _dIDEBK _dOCLCO _dTEFOD _dOCLCO _dYDX _dOCLCO _dQCL _dUPM _dS4S _dOCLCQ _dU3W _dD6H _dOCLCF _dBRX |
||
019 |
_a960895214 _a965413088 |
||
020 |
_a9780124199903 _q(electronic bk.) |
||
020 |
_a0124199909 _q(electronic bk.) |
||
020 | _z9780124199712 | ||
035 |
_a(OCoLC)958936667 _z(OCoLC)960895214 _z(OCoLC)965413088 |
||
050 | 4 | _aQA76.5915 | |
072 | 7 |
_aCOM _x013000 _2bisacsh |
|
072 | 7 |
_aCOM _x014000 _2bisacsh |
|
072 | 7 |
_aCOM _x018000 _2bisacsh |
|
072 | 7 |
_aCOM _x067000 _2bisacsh |
|
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
072 | 7 |
_aCOM _x037000 _2bisacsh |
|
072 | 7 |
_aCOM _x052000 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a004.67/8 _223 |
100 | 1 |
_aMacaulay, Tyson, _eauthor. |
|
245 | 1 | 0 |
_aRIoT control : understanding and managing risks and the internet of things / _h[electronic resource] _cTyson Macaulay. |
264 | 1 |
_aCambridge, MA : _bMorgan Kaufmann, _c2017. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
588 | 0 | _aVendor-supplied metadata. | |
520 | _aRIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular�i�A� Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases. | ||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aInternet of things _xManagement. |
|
650 | 0 | _aUbiquitous computing. | |
650 | 0 | _aEmbedded Internet devices. | |
650 | 0 |
_aInternet _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS / Computer Literacy _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Computer Science _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Data Processing _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Hardware / General _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Information Technology _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Machine Theory _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Reference _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
650 | 7 |
_aEmbedded Internet devices. _2fast _0(OCoLC)fst01742162 |
|
650 | 7 |
_aInternet _xSecurity measures. _2fast _0(OCoLC)fst01751426 |
|
650 | 7 |
_aUbiquitous computing. _2fast _0(OCoLC)fst01160283 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2local |
|
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780124199712 |
999 |
_c247425 _d247425 |