• صفحه اصلی
  • جستجوی پیشرفته
  • فهرست کتابخانه ها
  • درباره پایگاه
  • ارتباط با ما
  • تاریخچه

عنوان
The internet of risky things :

پدید آورنده
Sean Smith.

موضوع
Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.

رده
TK5105
.
8857
.
S65
2017

کتابخانه
مرکز و کتابخانه مطالعات اسلامی به زبان‌های اروپایی

محل استقرار
استان: قم ـ شهر: قم

مرکز و کتابخانه مطالعات اسلامی به زبان‌های اروپایی

تماس با کتابخانه : 32910706-025

شابک

شابک
149196362X
شابک
9781491963623

عنوان و نام پديدآور

عنوان اصلي
The internet of risky things :
نام عام مواد
[Book]
ساير اطلاعات عنواني
trusting the devices that surround us /
نام نخستين پديدآور
Sean Smith.

وضعیت ویراست

وضعيت ويراست
First edition.

وضعیت نشر و پخش و غیره

محل نشرو پخش و غیره
Sebastopol, CA :
نام ناشر، پخش کننده و غيره
O'Reilly,
تاریخ نشرو بخش و غیره
[2017]
تاریخ نشرو بخش و غیره
©2017

مشخصات ظاهری

نام خاص و کميت اثر
vii, 229 pages :
ساير جزييات
illustrations ;
ابعاد
23 cm

یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر

متن يادداشت
Includes bibliographical references and index.

یادداشتهای مربوط به مندرجات

متن يادداشت
Copyright; Table of Contents; Preface; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Brave New Internet; Worst-Case Scenarios: Cyber Love Canal; What's Different?; Lifetimes; The IoT in the Physical World; Inevitable and Unfortunate Decay; Zero-Days and Forever-Days; The Fix is In?; The IoT's Impact on the Physical World; Houses; Cars; Traffic; Airplanes; Infrastructure; Medicine; The Physical World's Impact on the IoT; Missing Things; Large Attack Surface; Jumping Across Boundaries; Worst-Case Scenarios: Cyber Pearl Harbor; Targeted Malicious Attacks in the IoT
متن يادداشت
Anti-Pattern: Cryptography BlundersInstance: Bad Randomness; Instance: Common Keys; Instance: Bad PKI; Instance: Aging of Cryptography and Protocols; A Better Future; Works Cited; Chapter 5. Names and Identity in the IoT; Who Is That, Really?; Beyond Bits; Authorization; The Standard Cryptographic Toolkit; The Somewhat Impossible; Symmetric Cryptography; Public Key Cryptography; Public Key Infrastructure; Cryptographic Hashing; The Price Tag; The Newer Toolkit; Macaroons; Blockchains; PUFs; Addresses and Names; IoT Challenges; Ontologies of Association; Ontologies of Interaction
متن يادداشت
PKI and Large PopulationsConstrained Devices and Channels; Privacy Side Effects; Cryptographic Decay; Moving Forward; Works Cited; Chapter 6. The Internet of Tattletale Devices; Cautionary Tales; IoC Privacy Spills; IoT Privacy Worries; When Things Betray Their Owners; Your Things May Talk to Police; Your Things May Phone Home; Your Things May Talk to the Wrong People; Emerging Infrastructure for Spying; Wearables and Health; Internet of Big Brother's Things; Getting What We Want; Saying What We Want; Law and Standards; Technological Enforcement; Works Cited
متن يادداشت
TodayPast and Future; Smart Vehicles; The Dawn of Fly-by-Wire; Fear of the A320; What Happened Next; Past and Future; Today; Not Repeating Past Mistakes; Works Cited; Chapter 4. Overcoming Design Patterns for Insecurity; Anti-Pattern: Doing Too Much; Instance: Failure of Input Validation; Instance: Excess Power; Instance: Differential Parsing; Anti-Pattern: Coding Blunders; Anti-Pattern: Authentication Blunders; Instance: No Authentication; Instance: Default Credentials; Instance: Permanent Credentials; Instance: No Delegation; Instance: Easy Exposure; Moving Forward
متن يادداشت
Where to Go NextWhat Do We Do?; What Comes Next; Works Cited; Chapter 2. Examples and Building Blocks; Computing Devices; Basic Elements; Moore's Law; How IoT Systems Differ; Architectures for an IoT; Connection to Other Computers; Connection to the Physical World; The Backend; The Bigger Picture; What's Next; Works Cited; Chapter 3. The Future Has Been Here Before; Bug Background; Integer Overflow; Race Conditions; Memory Corruption; Impossible Scenarios; Smart Health IT; The Therac-25; The Sad Story; Today; Past and Future; Smart Grid; The Balancing Act; Lights Out in 2003; Root Causes
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8

یادداشتهای مربوط به خلاصه یا چکیده

متن يادداشت
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we're headed for trouble. With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers, engineers, industrial designers, makers, and researchers will explore "design patterns of insecurities" and learn what's required to route around or fix them in the nascent IoT. -- Provided by publisher.
متن يادداشت
This book explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers, engineers, industrial designers, makers, and researchers will explore "design patterns of insecurities" and learn what's required to route around or fix them in the nascent IoT

موضوع (اسم عام یاعبارت اسمی عام)

موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
Embedded Internet devices.
موضوع مستند نشده
Internet of things-- Security measures.
موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
COMPUTERS-- Hardware.
موضوع مستند نشده
COMPUTERS-- Internet.
موضوع مستند نشده
COMPUTERS-- Security-- Online Safety & Privacy.
موضوع مستند نشده
Embedded Internet devices.
موضوع مستند نشده
TECHNOLOGY & ENGINEERING-- Industrial Technology.
موضوع مستند نشده
TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.
موضوع مستند نشده
TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.
موضوع مستند نشده
TECHNOLOGY & ENGINEERING-- Robotics.
موضوع مستند نشده
TECHNOLOGY & ENGINEERING-- Sensors.

رده بندی ديویی

شماره
004
.
678
ويراست
23

رده بندی کنگره

شماره رده
TK5105
.
8857
نشانه اثر
.
S65
2017

نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )

مستند نام اشخاص تاييد نشده
Smith, Sean W.,1964-

مبدا اصلی

تاريخ عمليات
20200823033042.0
قواعد فهرست نويسي ( بخش توصيفي )
rda

دسترسی و محل الکترونیکی

نام الکترونيکي
 مطالعه متن کتاب 

اطلاعات رکورد کتابشناسی

نوع ماده
[Book]

اطلاعات دسترسی رکورد

تكميل شده
Y

پیشنهاد / گزارش اشکال

اخطار! اطلاعات را با دقت وارد کنید
ارسال انصراف
این پایگاه با مشارکت موسسه علمی - فرهنگی دارالحدیث و مرکز تحقیقات کامپیوتری علوم اسلامی (نور) اداره می شود
مسئولیت صحت اطلاعات بر عهده کتابخانه ها و حقوق معنوی اطلاعات نیز متعلق به آنها است
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال