SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Orchestrating and Automating Security for the Internet of Things - Delivering Advanced Security Capabilities from Edge to Cloud for IoT

Orchestrating and Automating Security for the Internet of Things, 1. udgave

Orchestrating and Automating Security for the Internet of Things Vital Source e-bog

Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
(2018)
Pearson International
410,00 kr. 369,00 kr.
Leveres umiddelbart efter køb
Orchestrating and Automating Security for the Internet of Things, 1. udgave

Orchestrating and Automating Security for the Internet of Things Vital Source e-bog

Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
(2018)
Pearson International
482,00 kr. 433,80 kr.
Leveres umiddelbart efter køb
Orchestrating and Automating Security for the Internet of Things, 1. udgave

Orchestrating and Automating Security for the Internet of Things Vital Source e-bog

Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
(2018)
Pearson International
337,00 kr. 303,30 kr.
Leveres umiddelbart efter køb
Orchestrating and Automating Security for the Internet of Things - Delivering Advanced Security Capabilities from Edge to Cloud for IoT

Orchestrating and Automating Security for the Internet of Things

Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Anthony Sabella, Marcelo Yannuzzi og Rik Irons-Mclean
(2018)
Sprog: Engelsk
Cisco Press
836,00 kr. 752,40 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage

Detaljer om varen

  • 1. Udgave
  • Vital Source 180 day rentals (dynamic pages)
  • Udgiver: Pearson International (Juni 2018)
  • Forfattere: Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
  • ISBN: 9780134756912R180
Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. ·         Understand the challenges involved in securing current IoT networks and architectures ·         Master IoT security fundamentals, standards, and modern best practices ·         Systematically plan for IoT security ·         Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks ·         Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions ·         Implement platform security services including identity, authentication, authorization, and accounting ·         Detect threats and protect data in IoT environments ·         Secure IoT in the context of remote access and VPNs ·         Safeguard the IoT platform itself ·         Explore use cases ranging from smart cities and advanced energy systems to the connected car ·         Preview evolving concepts that will shape the future of IoT security  
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 365 day rentals (dynamic pages)
  • Udgiver: Pearson International (Juni 2018)
  • Forfattere: Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
  • ISBN: 9780134756912R365
Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. ·         Understand the challenges involved in securing current IoT networks and architectures ·         Master IoT security fundamentals, standards, and modern best practices ·         Systematically plan for IoT security ·         Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks ·         Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions ·         Implement platform security services including identity, authentication, authorization, and accounting ·         Detect threats and protect data in IoT environments ·         Secure IoT in the context of remote access and VPNs ·         Safeguard the IoT platform itself ·         Explore use cases ranging from smart cities and advanced energy systems to the connected car ·         Preview evolving concepts that will shape the future of IoT security  
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: 5 år fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 90 day rentals (dynamic pages)
  • Udgiver: Pearson International (Juni 2018)
  • Forfattere: Anthony Sabella, Rik Irons-Mclean og Marcelo Yannuzzi
  • ISBN: 9780134756912R90
Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. ·         Understand the challenges involved in securing current IoT networks and architectures ·         Master IoT security fundamentals, standards, and modern best practices ·         Systematically plan for IoT security ·         Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks ·         Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions ·         Implement platform security services including identity, authentication, authorization, and accounting ·         Detect threats and protect data in IoT environments ·         Secure IoT in the context of remote access and VPNs ·         Safeguard the IoT platform itself ·         Explore use cases ranging from smart cities and advanced energy systems to the connected car ·         Preview evolving concepts that will shape the future of IoT security  
Licens varighed:
Bookshelf online: 90 dage fra købsdato.
Bookshelf appen: 90 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Paperback: 1008 sider
  • Udgiver: Cisco Press (Maj 2018)
  • Forfattere: Anthony Sabella, Marcelo Yannuzzi og Rik Irons-Mclean
  • ISBN: 9781587145032
Master powerful techniques and approaches for securing IoT systems of all kinds-current and emerging


Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards.


The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You'll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples.


This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them.


- Understand the challenges involved in securing current IoT networks and architectures

- Master IoT security fundamentals, standards, and modern best practices

- Systematically plan for IoT security

- Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks

- Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions

- Implement platform security services including identity, authentication, authorization, and accounting

- Detect threats and protect data in IoT environments

- Secure IoT in the context of remote access and VPNs

- Safeguard the IoT platform itself

- Explore use cases ranging from smart cities and advanced energy systems to the connected car

- Preview evolving concepts that will shape the future of IoT security

Foreword xxvii Introduction xxix
Part I Introduction to the Internet of Things (IoT) and IoT Security
Chapter 1 Evolution of the Internet of Things (IoT) 1 Defining the Internet of Things 2 Making Technology and Architectural Decisions 5 Is the Internet of Things Really So Vulnerable? 8 Summary 9 References 10
Chapter 2 Planning for IoT Security 11 The Attack Continuum 11 The IoT System and Security Development Lifecycle 13 Phase
1: Initiation 15 Phase
2: Acquisition and Development 15 Phase
3: Implementation 16 Phase
4: Operations and Maintenance 17 Phase
5: Disposition 17 The End-to-End Considerations 17 Segmentation, Risk, and How to Use Both in Planning the Consumer/Provider Communications Matrix 21 Segmentation 21 New Approach 25 Summary 30 References 30
Chapter 3 IoT Security Fundamentals 31 The Building Blocks of IoT 31 The IoT Hierarchy 35 Primary Attack Targets 37 Layered Security Tiers 43 Summary 46 References 47
Chapter 4 IoT and Security Standards and Best Practices 49 Today''s Standard Is No Standard 49 Defining Standards 53 The Challenge with Standardization 56 IoT "Standards" and "Guidance" Landscape 58 Architectural or Reference Standards 59 Industrial/Market Focused 61 Standards for NFV, SDN, and Data Modeling for Services 63 Data Modeling and Services 67 Communication Protocols for IoT 70 Physical and MAC Layers 73 Network Layer 73 Transport Layer 74 Application Layer 74 Specific Security Standards and Guidelines 75 Summary 79 References 80
Chapter 5 Current IoT Architecture Design and Challenges 83 What, Why, and Where? A Summary 85 Approaches to IoT Architecture Design 88 An X-Centric Approach 91 The People-/User-Centric IoT Approach (Internet of People and Social IoT) 98 The Information-Centric IoT Approach 100 The Data-Centric IoT Approach 104 System Viewpoint: A Cloudy Perspective 106 Middleware 118 Lambda Architecture 119 Full IoT Stack/Universal 120 General Approaches 120 Internet of Things Architecture Reference Architecture (IoT-A RA) 120 ITU-T Y.2060 125 IoT World Forum (IoTWF) Reference Model 126 oneM2M Reference Architecture 129 IEEE P2413 IoT Architecture 132 The OpenFog Consortium Reference Architecture 133 Alliance for the Internet of Things Innovation (AIOTI) 138 Cloud Customer Architecture for IoT 140 Open Connectivity Foundation and IoTivity 142 Industrial/Market Focused 144 The Industrial Internet Consortium (IIC) 144 Industry
4.0 148 OPC Unified Architecture (OPC UA) 150 Cisco and Rockwell Automation Converged Plantwide Ethernet 153 Cisco Smart Grid Reference Model: GridBlocks 153 NFV- and SDN-Based Architectures for IoT 154 Approaches to IoT Security Architecture 156 Purdue Model of Control Hierarchy Reference Model 157 Industrial Internet Security Framework (IISF) IIC Reference Architecture 160 Cloud Security Alliance Security Guidance for IoT 165 Open Web Application Security Project (OWASP) 168 Cisco IoT Security Framework 168 The IoT Platform Design of Today 172 Security for IoT Platforms and Solutions 178 Challenges with Today''s Designs: The Future for IoT Platforms 179 Summary 183 References 183
Part II Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT
Chapter 6 Evolution and Benefits of SDX and NFV Technologies and Their Impact on IoT 185 A Bit of History on SDX and NFV and Their Interplay 185 Software-Defined Networking 188 OpenFlow 192 Open Virtual Switch 195 Vector Packet Processing 198 Programming Protocol-Independent Packet Processors (P4) 201 OpenDaylight 203 Extending the Concept of Software-Defined Networks 212 Network Functions Virtualization 217 Virtual Network Functions and Forwarding Graphs 221 ETSI NFV Management and Orchestration (MANO) 225 The Impact of SDX and NFV in IoT and Fog Computing 235 Summary 248 References 249
Chapter 7 Securing SDN and NFV Environments 251 Security Considerations for the SDN Landscape 251
1: Securing the Controller 252
2: Securing Controller Southbound Communications 256
3: Securing the Infrastructure Planes 260
4: Securing Controller Northbound Communications 263
5: Securing Management and Orchestration 268
6: Securing Applications and Services 270 Security Considerations for the NFV Landscape 272 NFV Threat Landscape 273 Secure Boot 274 Secure Crash 275 Private Keys Within Cloned Images 276 Performance Isolation 278 Tenant/User Authentication, Authorization, and Accounting (AAA) 279 Authenticated Time Service 281 Back Doors with Test and Monitor Functions 281 Multi-administrator Isolation 282 Single Root I/O Virtualization (SRIOV) 283 SRIOV Security Concerns 285 Summary 285 References 285
Chapter 8 The Advanced IoT Platform and MANO 287 Next-Generation IoT Platforms: What the Research Says 287 Next-Generation IoT Platform Overview 291 Platform Architecture 294 Platform Building Blocks 295 Platform Intended Outcomes: Delivering Capabilities as an Autonomous End-to-End Service 303 Example Use Case Walkthrough 308 Event-Based Video and Security Use Case 309 Summary 321 References 321
Part III Security Services: For the Platform, by the Platform
Chapter 9 Identity, Authentication, Authorization, and Accounting 323 Introduction to Identity and Access Management for the IoT 324 Device Provisioning and Access Control Building Blocks 326 Naming Conventions to Establish "Uniqueness" 327 Secure Bootstrap 328 Immutable Identity 328 Bootstrapping Remote Secure Key Infrastructures 329 Device Registration and Profile Provisioning 330 Provisioning Example Using AWS IoT 331 Provisioning Example Using Cisco Systems Identity Services Engine 334 Access Control 336 Identifying Devices 336 Endpoint Profiling 337 Profiling Using ISE 337 Device Sensor 340 Methods to Gain Identity from Constrained Devices 345 Energy Limitations 346 Strategy for Using Power for Communication 347 Leveraging Standard IoT Protocols to Identify Constrained Devices 348 Authentication Methods 351 Certificates 351 Trust Stores 355 Revocation Support 356 SSL Pinning 357 Passwords 357 Limitations for Constrained Devices 358 Biometrics 359 AAA and RADIUS 361 A/V Pairs 362
802.1X 363 MAC Address Bypass 365 Flexible Authentication 366 Dynamic Authorization Privileges 367 Cisco Identity Services Engine and TrustSec 368 RADIUS Change of Authorization 368 Access Control Lists 374 TrustSec and Security Group Tags 376 TrustSec Enablement 379 SGACL 384 Manufacturer Usage Description 390 Finding a Policy 390 Policy Types 390 The MUD Model 392 AWS Policy-based Authorization with IAM 394 Amazon Cognito 395 AWS Use of IAM 395 Policy-based Authorization 395 Accounting 397 How Does Accounting Relate to Security? 398 Using a Guideline to Create an Accounting Framework 398 Meeting User Accounting Requirements 400 Scaling IoT Identity and Access Management with Federation Approaches 402 IoT IAM Requirements 403 OAuth
2.0 and OpenID Connect
1.0 404 OAuth
2.0 404 OpenID Connect
1.0 405 OAuth2.0 and OpenID Connect Example for IoT 405 Cloud to Cloud 406 Native Applications to the Cloud 408 Device to Device 409 Evolving Concepts: Need for Identity Relationship Management 411 Summary 414 References 415
Chapter 10 Threat Defense 417 Centralized and Distributed Deployment Options for Security Services 418 Centralized 418 Distributed 420 Hybrid 422 Fundamental Network Firewall Technologies 422 ASAv 423 NGFWv 423 Network Address Translation 424 Overlapping 425 Overloading or Port Address Translation 425 Packet Filtering 426 Industrial Protocols and the Need for Deeper Packet Inspection 428 Common Industrial Protocol 428 Lack of Security 429 Potential Solutions: Not Good Enough 430 Alternative Solution: Deep Packet Inspection 430 Sanity Check 431 User Definable 432 Applying the Filter 432 Application Visibility and Control 433 Industrial Communication Protocol Example 435 MODBUS Application Filter Example 436 Intrusion Detection System and Intrusion Prevention System 437 IPS 438 Pattern Matching 438 Protocol Analysis 439 IDS/IPS Weakness 439 Advanced Persistent Threats and Behavioral Analysis 440 Behavior Analysis Solutions 441 Protocols Used to Gain Additional Visibility 442 Network as a Sensor 444 Pairing with Contextual Information and Adaptive Network Control 446 Encrypted Traffic Analytics 450 Malware Protection and Global Threat Intelligence 455 Cisco Advanced Malware Protection and TALOS 456 DNS-Based Security 462 Umbrella (DNS S
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.