
Securing the Connected World
A Comprehensive Guide to IoT Security
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to Cart failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from wishlist failed.
Please try again later
Adding to library failed
Please try again
Follow podcast failed
Please try again
Unfollow podcast failed
Please try again
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.
Buy for $4.99
-
Narrated by:
-
Virtual Voice

This title uses virtual voice narration
Virtual voice is computer-generated narration for audiobooks.
Starting with an introspective on the evolution of IoT and the necessity of its security, we delve into detailing the components and workings of IoT devices and their vulnerability to cyber threats. Realize the profound impact of IoT cyberattacks, not just on a personal level but also industrial and societal fronts.
The succeeding chapters address the all-too-common IoT security threats, including unauthorized access, data breaches, DDoS attacks, and malware. Unravel the nuances of IoT security challenges such as hardware limitations, device diversity, and interoperability issues.
The digital journey progresses into the intricacies of cryptography in IoT security, throwing light on concepts like asymmetric and symmetric encryption, secure key storage, and digital signatures. It goes on to illuminate various strategies and techniques concerning network-level and device-level security.
Regulation landscapes, standards, and policies acting as key stakeholders in IoT security are also given their due importance. The importance of an integrated security approach is emphasized, including a discussion on security orchestration and automation as a vital part of securing the IoT ecosystem.
The importance of data security is recognized as various strategies and methods for securing IoT data are presented, including emphasis on encryption and secure cloud storage.
The later chapters dive into the intriguing aspect of IoT risk management, assessing various techniques, strategization, incident responses, and recovery.
Finally, an insight is provided into the future of IoT security trends and the anticipated role of AI. The book also deals with case studies from both success stories and failures, offering valuable insights and lessons.
In essence, 'Securing the Connected World' is an exploration into the multifaceted world of IoT and its security. It is ideal for anyone who wishes to explore, understand, and master the fundamental aspects of cybersecurity. Dive in, and brace yourself for an expedition of a lifetime!
No reviews yet