Non-Fiction Books:

Internet of Things Vulnerabilities and Recovery Strategies

Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Hardback
$546.99
Releases

Pre-order to reserve stock from our first shipment. Your credit card will not be charged until your order is ready to ship.

Available for pre-order now

Buy Now, Pay Later with:

4 payments of $136.75 with Afterpay Learn more

Pre-order Price Guarantee

If you pre-order an item and the price drops before the release date, you'll pay the lowest price. This happens automatically when you pre-order and pay by credit card.

If paying by PayPal, Afterpay, Zip or internet banking, and the price drops after you have paid, you can ask for the difference to be refunded.

If Mighty Ape's price changes before release, you'll pay the lowest price.

Availability

This product will be released on

Delivering to:

It should arrive:

  • 5-12 July using International Courier

Description

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting-edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT-systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision IoT Integration Information Storage IoT Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy-driven measures, the book looks at developing secure and fault-tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

Author Biography:

Faheem Syeed Masoodi is Assistant Professor in the Department of Computer Science, University of Kashmir. Earlier, he served College of Computer Science, University of Jizan, Saudi Arabia as an Assistant Professor. Alwi M. Bamhdi is an associate professor in the Department of Computer Sciences, Umm Al-Qura University, Saudi Arabia. He received his MSc and Ph.D. in computer science in 2014 from Heriot-Watt University, UK. Majid A.Charoo has worked as a technology consultant in Global Science & Technology Forum, Singapore and was an Assistant Professor in Al-Jouf University, Saudi Arabia in the department of Information Sciences. Zubair Sayeed Masoodi is an assistant professor and head of the Computer Applications Department at Government Degree College for Women Sopore, India. He is currently heading the Department of Computer Applications of this college. Arif Mohammad is a Lead Digital Engineer at Louis Dreyfus Company, The Netherlands. Gousiya Hussain is currently pursuing a PhD in the domain of Cloud Security from the Department of Computer Sciences, Mewar University, India.
Release date Australia
June 28th, 2024
Audience
  • Tertiary Education (US: College)
Contributors
  • Edited by Alwi Bamhdi
  • Edited by Arif Lattoo
  • Edited by Fahim Masoodi
  • Edited by Gousiya Hussain
  • Edited by Majid Ahmad Charoo
  • Edited by Zubair Masoodi
Illustrations
15 Tables, black and white; 77 Line drawings, black and white; 77 Illustrations, black and white
Pages
360
ISBN-13
9781032473314
Product ID
38396507

Customer previews

Nobody has previewed this product yet. You could be the first!

Write a Preview

Help & options

Filed under...