![]() |
![]() |
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
This book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Science DMZs). The Science DMZ is a high-speed network designed to facilitate the transfer of big science data which is presented in this book. These networks are increasingly important, as large data sets are now often transferred across sites. This book starts by describing the limitations of general-purpose networks which are designed for transferring basic data but face numerous challenges when transferring terabyte- and petabyte-scale data. This book follows a bottom-up approach by presenting an overview of Science DMZs and how they overcome the limitations of general-purpose networks. It also covers topics that have considerable impact on the performance of large data transfers at all layers: link layer (layer-2) and network layer (layer-3) topics such as maximum transmission unit (MTU), switch architectures, and router’s buffer size; transport layer (layer-4) topics including TCP features, congestion control algorithms for high-throughput high-latency networks, flow control, and pacing; applications (layer-5) used for large data transfers and for maintenance and operation of Science DMZs; and security considerations. Most chapters incorporate virtual laboratory experiments, which are conducted using network appliances running real protocol stacks. Students in computer science, information technology and similar programs, who are interested in learning fundamental concepts related to high-speed networks and corresponding implementations will find this book useful as a textbook. This book assumes minimal familiarity with networking, typically covered in an introductory networking course. It is appropriate for an upper-level undergraduate course and for a first-year graduate course. Industry professionals working in this field will also want to purchase this book.
This book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Science DMZs). The Science DMZ is a high-speed network designed to facilitate the transfer of big science data which is presented in this book. These networks are increasingly important, as large data sets are now often transferred across sites. This book starts by describing the limitations of general-purpose networks which are designed for transferring basic data but face numerous challenges when transferring terabyte- and petabyte-scale data. This book follows a bottom-up approach by presenting an overview of Science DMZs and how they overcome the limitations of general-purpose networks. It also covers topics that have considerable impact on the performance of large data transfers at all layers: link layer (layer-2) and network layer (layer-3) topics such as maximum transmission unit (MTU), switch architectures, and router's buffer size; transport layer (layer-4) topics including TCP features, congestion control algorithms for high-throughput high-latency networks, flow control, and pacing; applications (layer-5) used for large data transfers and for maintenance and operation of Science DMZs; and security considerations. Most chapters incorporate virtual laboratory experiments, which are conducted using network appliances running real protocol stacks. Students in computer science, information technology and similar programs, who are interested in learning fundamental concepts related to high-speed networks and corresponding implementations will find this book useful as a textbook. This book assumes minimal familiarity with networking, typically covered in an introductory networking course. It is appropriate for an upper-level undergraduate course and for a first-year graduate course. Industry professionals working in this field will also want to purchase this book.
|
![]() ![]() You may like...
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
|