larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT

eBook (Watermarked)

  • Your Price: $51.19
  • List Price: $63.99
  • Estimated Release: Jun 10, 2018
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2018
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 600
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-475694-0
  • ISBN-13: 978-0-13-475694-3

Adoption of Internet of Things (IoT) technologies is accelerating in the enterprise and industry, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are making it possible to systematically harden IoT environments. Orchestrating and Automating Security for the Internet of Things shows how to safeguard IoT systems by delivering security through new NFV, SDN, and Fog architectures. Three of Cisco’s leading experts demonstrate how to apply current and emerging IoT security standards to safeguard your own environment.

The authors begin by reviewing existing IoT architectures and standards, identifying key security risks associated with early deployments, and showing how early adopters have attempted to respond. Next, they introduce standards-based offerings, which leverage NFV, SDN and FOG; explain why these architectures lend themselves well to IoT and IoT security; and explain advanced security concepts that can protect these systems. Finally, in Part IV, the authors preview emerging technologies and security concepts that will shape IoT security, and present real-world use case examples.

Table of Contents

Part I: Introduction to the Internet of Things (IoT) and IoT Security

Chapter 1: Evolution of the Internet of Things (IoT)

Chapter 2: Planning for IoT Security

Chapter 3: IoT Security Fundamentals

Chapter 4: IoT Security Standards and Best Practices

Chapter 5: Current IoT Network Architecture Design, and Challenges

Part II: Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT

Chapter 6: Benefits of SDN and NFV Technologies

Chapter 7: Ksecuring SDN and NFV Environments

Chapter 8: The Advanced IoT Platform and MANO

Part III: Security Services: For the Platform, by the Platform

Chapter 9: Identity, Authentication Authorization and Accounting

Chapter 10: Introduction to Threat Detection

Chapter 11: Data Protection in IoT

Chapter 12: Remote Access and Virtual Private Networks (VPNs)

Chapter 13: Securing the Platform Itself

Part IV. Use Cases, and Emerging Standards and Technologies

Chapter 14: Smart Cities

Chapter 15: Industrial Environments

Chapter 16: Connected Cars

Chapter 17:  Evolving Concepts That will Shape the Security Service Future

Unlimited one-month access with your purchase
Free Safari Membership