Internet of Things Vulnerabilities and Recovery Strategies

Internet of Things Vulnerabilities and Recovery Strategies
Author: Fahim Masoodi (Editor), Alwi Bamhdi (Editor), Majid Ahmad Charoo (Editor), Zubair Masoodi (Editor), Arif Lattoo (Editor), Gousiya Hussain (Editor)
Publisher finelybook 出版社: Auerbach Publications
Edition 版次: 1st
Publication Date 出版日期: 2024-07-26
Language 语言: English
Print Length 页数: 344 pages
ISBN-10: 1032473312
ISBN-13: 9781032473314


Book Description
By finelybook

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to:

  • Data Routing
  • Data Integrity
  • Device Supervision
  • IoT Integration
  • Information Storage
  • IoT Performance

The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

About the Author

Faheem Syeed Masoodi is an Assistant Professor in the Department of Computer Science, University of Kashmir. Earlier, he served College of Computer Science, University of Jizan, Saudi Arabia as an Assistant Professor.

Alwi M. Bamhdi is an Associate Professor in the Department of Computer Sciences, Umm Al-Qura University, Saudi Arabia. He received his MSc and Ph.D. in computer science in 2014 from Heriot-Watt University, UK.

Majid A.Charoo has worked as a technology consultant in Global Science & Technology Forum, Singapore and was an assistant professor in Al-Jouf University, Saudi Arabia in the department of Information Sciences.

Zubair Sayeed Masoodi is an Assistant Professor and head of the Computer Applications Department at Government Degree College for Women Sopore, India. He is currently heading the Department of Computer Applications at this college.

Arif Mohammad is a Lead Digital Engineer at Louis Dreyfus Company, The Netherlands.

Gousiya Hussain is currently pursuing a PhD in Cloud Security from the Department of Computer Sciences, Mewar University, India.

Amazon page

相关文件下载地址

Formats: PDF | 20 MB
下载地址 Download解决验证以访问链接!
打赏
未经允许不得转载:finelybook » Internet of Things Vulnerabilities and Recovery Strategies

评论 抢沙发

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫