Show simple item record

dc.creatorCheruvu, Sunil
dc.creatorKumar, Anil
dc.creatorSmith, Ned
dc.creatorWheeler, David M.
dc.date.accessioned2020-11-23T17:11:24Z
dc.date.available2020-11-23T17:11:24Z
dc.date.created2020
dc.identifier.isbn978-1-4842-2896-8
dc.identifier.urihttp://hdl.handle.net/20.500.12010/15923
dc.description.abstractIn 1989 I walked into the Distributed Systems Laboratory as an undergraduate in the Electrical Engineering department at University of Pennsylvania and it seemed as if I didn’t leave that lab until I received a doctorate 6 years later.Combining compute and communications has been a professional passion ever since as I’ve lead a range of initiatives at Intel Corporation in protecting video and audio content, bring networks and digital technologies into the home, securing compute infrastructure, and preparing for a new generation of distributed applications popularly referred to as the Internet of Things (IoT). IoT’s connection and computerization is a pervasive trend transforming everything we do and the infrastructure which supports us.From smart cities and homes to Industry 4.0, enterprises, critical infrastructure, healthcare, retail, and wearables, vast flows of data, increasingly processed using machine learning algorithms, are altering our existence.This unprecedented scale, pervasiveness, and interconnectivity also creates an environment where the security and integrity of these applications becomes a paramount concern.One only has to look to the headlines where attacks on critical infrastructure such as power generation and distribution, vulnerabilities in our automobiles, and malware in the devices such as webcams, smartphones, and PCs which we bring into our homes, highlight our collective vulnerability. Given the extensive attack surfaces being created and the asymmetry between attackers needing to find a single vulnerability to exploit while defenders have to find and close all vulnerabilities, IoT creates an unmatched set of security challenges.spa
dc.format.extent515 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherApress openspa
dc.subjectDemystifying internetspa
dc.subjectPlatform securityspa
dc.titleDemystifying internet of things security : successful iot device/edge and platform security deploymentspa
dc.subject.lembEconomíaspa
dc.subject.lembSeguridad informática - Normasspa
dc.subject.lembProtección de datosspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.localAbierto (Texto Completo)spa
dc.identifier.doihttps://doi.org/10.1007/978-1-4842-2896-8
dc.type.coarhttp://purl.org/coar/resource_type/c_2f33spa
dc.rights.creativecommonshttp://creativecommons.org/licenses/by/4.0/


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record