Trusted Cellular IoT Devices (Record no. 84780)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03155nam a22005175i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-19663-8 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730163610.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221219s2022 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031196638 |
-- | 978-3-031-19663-8 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
100 1# - AUTHOR NAME | |
Author | Heins, Kersten. |
245 10 - TITLE STATEMENT | |
Title | Trusted Cellular IoT Devices |
Sub Title | Design Ingredients and Concepts / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2022. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 157 p. 56 illus., 55 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Synthesis Lectures on Engineering, Science, and Technology, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction and Scope -- Challenges and Objectives -- Cryptographic Toolkit -- Ingredients for Secure Design -- Device Design. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-19663-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2022. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cooperating objects (Computer systems). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of things. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cyber-Physical Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Internet of Things. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2690-0327 |
912 ## - | |
-- | ZDB-2-SXSC |
No items available.