000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230902b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031196621 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.6782 |
Item number |
HEI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Heins, Kersten |
245 ## - TITLE STATEMENT |
Title |
Trusted cellular IoT devices : design ingredients and concepts |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2022 |
Place of publication, distribution, etc |
Cham : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 257 p. ; |
Other physical details |
ill., (some col.), |
Dimensions |
25 cm |
365 ## - TRADE PRICE |
Price amount |
74.99 |
Price type code |
EUR |
Unit of pricing |
94.90 |
490 ## - SERIES STATEMENT |
Series statement |
Synthesis lectures on engineering, science, and technology |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Cyber-physical systems |
|
Topical term or geographic name as entry element |
Telecommunication |
|
Topical term or geographic name as entry element |
Electrical Technology |
|
Topical term or geographic name as entry element |
3GPP |
|
Topical term or geographic name as entry element |
Cellular network |
|
Topical term or geographic name as entry element |
Common Criteria |
|
Topical term or geographic name as entry element |
Counter measures |
|
Topical term or geographic name as entry element |
Cryptographic keys |
|
Topical term or geographic name as entry element |
Digital signatures |
|
Topical term or geographic name as entry element |
Firmware |
|
Topical term or geographic name as entry element |
Host MCU |
|
Topical term or geographic name as entry element |
IOT device |
|
Topical term or geographic name as entry element |
Protection |
|
Topical term or geographic name as entry element |
Public-key cryptography |
|
Topical term or geographic name as entry element |
Security MCUs |
|
Topical term or geographic name as entry element |
Sensor |
|
Topical term or geographic name as entry element |
Side-channel attacks |
|
Topical term or geographic name as entry element |
Smart card |
|
Topical term or geographic name as entry element |
Smart meter |
|
Topical term or geographic name as entry element |
STMicroelectronics |
|
Topical term or geographic name as entry element |
Tamper |
|
Topical term or geographic name as entry element |
Watchdog timer |
|
Topical term or geographic name as entry element |
SESIP |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |