¥9,224
通常配送無料 詳細
この本の出版予定日は2019年10月15日です。 在庫状況について
ただいま予約受付中です。
この商品は、Amazon.co.jp が販売、発送します。

おすすめ商品の読み込み中
お客様へのおすすめ商品

カートに追加中...

カートに追加されました

追加されませんでした

商品はお客様のカートに入っています。

カートを見る

追加されませんでした

本商品をカートに追加する際問題が発生しました。 後でもう一度試してください。
申し訳ありませんが、現在おすすめ商品を表示する際に問題が発生しています。 後でもう一度試してください。
ショッピングを続ける
裏表紙を表示 表紙を表示
サンプルを聴く 再生中... 一時停止   Audible オーディオエディションのサンプルをお聴きいただいています。
この画像を表示

The IoT Architect's Guide to Attainable Security and Privacy ハードカバー – 2019/10/15


その他()の形式およびエディションを表示する 他のフォーマットおよびエディションを非表示にする
価格
新品 中古品
ハードカバー, 2019/10/15
¥9,224
¥9,224
「予約商品の価格保証」対象商品。 詳細

booksPMP

2冊で最大6%(期間限定)、3冊以上で最大8%、10冊以上で最大10%ポイント還元

2冊を購入する際クーポンコード「2BOOKS」を、3冊以上は「MATOME」を入力すると最大6~10%ポイント還元!今すぐチェック

click to open popover

キャンペーンおよび追加情報

  • 「予約商品の価格保証」では、お客様が対象商品を予約注文した時点から発送手続きに入る時点、または発売日のいずれか早い時点までの期間中のAmazon.co.jp のサイト上で表示される最低販売価格が、お支払いいただく金額となります。予約商品の価格保証について詳しくはヘルプページをご覧ください。 詳細はこちら (細則もこちらからご覧いただけます)
  • 【判型について】 洋書の主な判型については こちらをご確認ください。

  • 【買取サービス】 Amazonアカウントを使用して簡単お申し込み。売りたいと思った時に、宅配買取もしくは出張買取を選択してご利用いただけます。 今すぐチェック。

Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。

  • iOSアプリのダウンロードはこちらをクリック
    Apple
  • Androidアプリのダウンロードはこちらをクリック
    Android
  • Amazonアプリストアへはこちらをクリック
    Android

無料アプリを入手するには、Eメールアドレスを入力してください。

kcpAppSendButton


Amazonタイムセール祭り開催中
期間限定!人気商品がお買い得。最大5,000ポイントのポイントアップキャンペーンも同時開催中。 タイムセール祭りを今すぐチェック

商品の説明

内容紹介

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.

"Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."― Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel

'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."― Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies

'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."― Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express

"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."― Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

著者について

David M. Wheeler, CISSP, CSSLP, GSLC, GREM, is a Senior Principal Engineer in the Platform Security Division of the Architecture Graphics and Software group at Intel Corporation and has thirty years’ experience in software, security, and networking for both commercial and government systems. In his current role, Dave is responsible for the research and development of new cryptographic algorithms and protocols, several security APIs, and libraries across Intel including for IoT platforms. He performs security reviews for both Intel’s IoT and cryptographic implementations and represents Intel at the IETF.
Within the Internet of Things, Dave has contributed to Intel’s Software-Defined Industrial Systems architecture and Intel’s Internet of Things group’s Health Application Platform. Prior to Intel, Dave held various lead software and systems architecture positions at Motorola, Honeywell Bull, General Dynamics, as well as his own firm. Dave has designed and built several hardware security engines, including a Type-2 security coprocessor for a software-defined radio, and the Intel Wireless Trust Module―a hardware cryptographic coprocessor on the Intel XScale processor. He has implemented several cryptographic libraries and protocol layers, including an IPSec-type implementation for an SDR radio; header compression protocol layers for IP, TCP, and UDP over multicast; a connectionless network layer protocol; two-factor authentication verification over RADIUS for a firewall VPN; PPP for serial; an instant messaging protocol over Bluetooth; and many others. of Intel’s Internet of Things to make Intel’s products and software projects secure.
Blog: http://crypto-corner.typepad.com
Twitter: @dmwheel1
LinkedIn: https://www.linkedin.com/in/davidmwheeler/

Damilare D. Fagbemi CISSP, GXPN, had what might be considered the best possible introduction to the field of information security. An innovative software system that he built, the first of its kind in Nigeria at the time, was hacked minutes before a highly publicized deployment. After that, needless to say, Damilare got interested in information security fairly quickly. He began learning about the security of data and networks, then took and passed the CISSP. Considering his background in software development, he wondered where the intersection might be between the vast disciplines of software and security. A few years later, in Ireland, he stumbled upon a job advertisement for product security engineering. Th e rest as they say, is history.
Since then, Damilare has had the opportunities to serve as an engineer, architect, and technical leader at high-tech firms such as Intel Corporation and McAfee LLC, in the United States and Ireland. In those roles, he has had the pleasure of working with talented product teams to architect and build secure Internet of Things (IoT), web, and mobile solutions. As part of Intel’s innovation in Smart Cities, he designed an IoT solution for Intelligent Transportation and contributed to the architecture of an artificial intelligence (AI)–powered platform for rapid decision making at the IoT edge. Damilare leads the Libraries Product Security Expert Center in Intel’s Architecture Graphics and Software group, where he has enjoyed creating and leading a cross-organizational and cross-located security engineering team. He has taught security architecture and design across three continents―North America, Africa, and Europe―and served as Chapter leader of the Open Web Application Security Project (OWASP) in Nigeria. He is also a former co-founder of a software development company, with clients spanning private and government sectors.
Blog: https://tech.edgeofus.com
Twitter: @damilarefagbemi
LinkedIn: https://www.linkedin.com/in/damilarefagbemi/

JC Wheeler began her career at US West Cellular analyzing analog network traffic and contributing to the rollout of one of the first commercial CDMA infrastructures in the nation, where she helped design the metrics and tools for CDMA traffic analysis. She then moved to Motorola to design cellular and satellite network protocols, authentication, crypto key management, and end-user features. She began consulting at General Dynamics in 2005, where she designed and integrated VoIP, header compression, multicast communications protocols, over-the-air provisioning, and IPSec variants for both MANET and satellite SDR waveforms. Th e small business she co-owned won a DoD SBIR and was a semifinalist in Th e Arizona Innovation Challenge for its smartphone secure framework; it was also a Navy Phase 2 SBIR subcontractor, building an AI engine to troubleshoot MANET radio configurations. JC is now retired and enjoys researching new technologies and macroeconomic trends.


登録情報

  • ハードカバー: 330ページ
  • 出版社: Auerbach Publications; 1版 (2019/10/16)
  • 言語: 英語
  • ISBN-10: 081536816X
  • ISBN-13: 978-0815368168
  • 発売日: 2019/10/15
  • 商品パッケージの寸法: 17.8 x 25.4 cm
  • おすすめ度: この商品の最初のレビューを書き込んでください。
  • さらに安い価格について知らせる

  • 目次を見る

まだカスタマーレビューはありません

星5つ (0%) 0%
星4つ (0%) 0%
星3つ (0%) 0%
星2つ (0%) 0%
星1つ (0%) 0%

この商品をレビュー

他のお客様にも意見を伝えましょう