|
Showing 1 - 3 of
3 matches in All Departments
This book describes how to architect and design Internet of Things
(loT) solutions that provide end-to-end security and privacy at
scale. It is unique in its detailed coverage of threat analysis,
protocol analysis, secure design principles, intelligent loT's
impact on privacy, and the effect of usability on security. The
book also unveils the impact of digital currency and the dark web
on the loT-security economy. It's both informative and
entertaining. "Filled with practical and relevant examples based on
years of experience ... with lively discussions and storytelling
related to loT security design flaws and architectural issues."-
Dr. James F. Ransome, Senior Director of Security Development
Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure
trove of information within this book that will benefit anyone, not
just the engineering community. This book has earned a permanent
spot on my office bookshelf."- Erv Comer, Fellow of Engineering,
Office of Chief Architect Zebra Technologies 'The importance of
this work goes well beyond the engineer and architect. The IoT
Architect's Guide to Attainable Security & Privacy is a crucial
resource for every executive who delivers connected products to the
market or uses connected products to run their business."- Kurt
Lee, VP Sales and Strategic Alliances at PWNIE Express "If we
collectively fail to follow the advice described here regarding loT
security and Privacy, we will continue to add to our mounting pile
of exploitable computing devices. The attackers are having a field
day. Read this book, now."- Brook S.E. Schoenfield, Director of
Advisory Services at IOActive, previously Master Security Architect
at McAfee, and author of Securing Systems
This book describes how to architect and design Internet of Things
(loT) solutions that provide end-to-end security and privacy at
scale. It is unique in its detailed coverage of threat analysis,
protocol analysis, secure design principles, intelligent loT's
impact on privacy, and the effect of usability on security. The
book also unveils the impact of digital currency and the dark web
on the loT-security economy. It's both informative and
entertaining. "Filled with practical and relevant examples based on
years of experience ... with lively discussions and storytelling
related to loT security design flaws and architectural issues."-
Dr. James F. Ransome, Senior Director of Security Development
Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure
trove of information within this book that will benefit anyone, not
just the engineering community. This book has earned a permanent
spot on my office bookshelf."- Erv Comer, Fellow of Engineering,
Office of Chief Architect Zebra Technologies 'The importance of
this work goes well beyond the engineer and architect. The IoT
Architect's Guide to Attainable Security & Privacy is a crucial
resource for every executive who delivers connected products to the
market or uses connected products to run their business."- Kurt
Lee, VP Sales and Strategic Alliances at PWNIE Express "If we
collectively fail to follow the advice described here regarding loT
security and Privacy, we will continue to add to our mounting pile
of exploitable computing devices. The attackers are having a field
day. Read this book, now."- Brook S.E. Schoenfield, Director of
Advisory Services at IOActive, previously Master Security Architect
at McAfee, and author of Securing Systems
|
|