Home Page Icon
Home Page
Table of Contents for
Half Title Page
Close
Half Title Page
by Carolina A. Adaros Boye
Understanding Cyberrisks in IoT
Cover
Half Title Page
Title Page
Copyright
Contents
Acknowledgments
Chapter 1 Introduction—What Is IoT?
Chapter 2 Real Attack Cases—It Is Not Science Fiction, Smart Things Can Turn against You
Chapter 3 Vulnerability Assessments and Hacking Experiments—The Risk Is There, Just Waiting for a Hacker with Enough Motivation
Chapter 4 Why Is IoT Especially Vulnerable? Requirements and Challenges
Chapter 5 IoT in an Office Environment—Printers, Smart TVs, Routers, and Uninvited Guests
Chapter 6 IoT in an Industrial Environment—Industrial Control Systems and Industry 4.0
Chapter 7 IoT in Utilities and Service Monitoring—Smart Meters and Other Stuff
Chapter 8 Typical Types of Attacks Targeting IoT Systems—Understanding What Can Go Wrong
Chapter 9 Lessons Learned—Getting a Better Idea about How to Handle the Risks
Chapter 10 Conclusions—Now What Do I Do with This Information?
References
About the Author
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Title Page
Understanding Cyberrisks in IoT
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset