Internet of Things Vulnerabilities and Recovery Strategies » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Internet of Things Vulnerabilities and Recovery Strategies
/
Название: Internet of Things Vulnerabilities and Recovery Strategies
Автор: Faheem Syeed Masoodi, Alwi M. Bamhdi, Majid A. Charoo, Zubair Sayeed Masoodi
Издательство: CRC Press
Год: 2025
Страниц: 355
Язык: английский
Формат: pdf (true)
Размер: 21.1 MB

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:

Data Routing
Data Integrity
Device Supervision
IoT Integration
Information Storage
IoT Performance

The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

This book is organized into 17 chapters, each covering important topics such as Internet of Things, Data Privacy and Security, Cyber-​Physical Threat Intelligence, Privacy Preservation in Cyber Physical Systems, Bio-​Inspired Meta-​Heuristic Methodologies for Security, Auditing IoT Security Vulnerability, Information Storage in IoT, Internet of Things Cloud Security Challenges, IoT Security with Blockchain Technology, Intrusion Detection and Privacy and Security. Each chapter provides valuable insights and practical strategies for addressing the complex challenges of IoT security and privacy.

Whether you're a seasoned researcher, a dedicated practitioner, or a policymaker concerned with safeguarding our digital future, this book offers a comprehensive guide to navigating the intricate landscape of IoT vulnerabilities.

Скачать Internet of Things Vulnerabilities and Recovery Strategies







[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!