Home Mathematics IoT Security Issues
book: IoT Security Issues
Book
Licensed
Unlicensed Requires Authentication

IoT Security Issues

  • Alasdair Gilchrist
Language: English
Published/Copyright: 2017
Become an author with De Gruyter Brill

About this book

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things.

This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained.

The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

Author / Editor information

Alasdair Gilchrist has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/Sdn/Nfv technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile Sdlc software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is knowledgeable in a wide range of technologies and has written a number of books in related fields.


Publicly Available Download PDF
i

Requires Authentication Unlicensed

Licensed
Download PDF
vii

Publicly Available Download PDF
ix

Requires Authentication Unlicensed

Licensed
Download PDF
1

Requires Authentication Unlicensed

Licensed
Download PDF
3

Requires Authentication Unlicensed

Licensed
Download PDF
5

Requires Authentication Unlicensed

Licensed
Download PDF
25

Requires Authentication Unlicensed

Licensed
Download PDF
27

Requires Authentication Unlicensed

Licensed
Download PDF
35

Requires Authentication Unlicensed

Licensed
Download PDF
43

Requires Authentication Unlicensed

Licensed
Download PDF
49

Requires Authentication Unlicensed

Licensed
Download PDF
55

Requires Authentication Unlicensed

Licensed
Download PDF
57

Requires Authentication Unlicensed

Licensed
Download PDF
65

Requires Authentication Unlicensed

Licensed
Download PDF
71

Requires Authentication Unlicensed

Licensed
Download PDF
79

Requires Authentication Unlicensed

Licensed
Download PDF
85

Requires Authentication Unlicensed

Licensed
Download PDF
97

Requires Authentication Unlicensed

Licensed
Download PDF
105

Requires Authentication Unlicensed

Licensed
Download PDF
107

Requires Authentication Unlicensed

Licensed
Download PDF
117

Requires Authentication Unlicensed

Licensed
Download PDF
121

Requires Authentication Unlicensed

Licensed
Download PDF
129

Requires Authentication Unlicensed

Licensed
Download PDF
131

Requires Authentication Unlicensed

Licensed
Download PDF
135

Requires Authentication Unlicensed

Licensed
Download PDF
141

Requires Authentication Unlicensed

Licensed
Download PDF
159

Requires Authentication Unlicensed

Licensed
Download PDF
167

Requires Authentication Unlicensed

Licensed
Download PDF
169

Requires Authentication Unlicensed

Licensed
Download PDF
175

Requires Authentication Unlicensed

Licensed
Download PDF
185

Requires Authentication Unlicensed

Licensed
Download PDF
191

Requires Authentication Unlicensed

Licensed
Download PDF
199

Requires Authentication Unlicensed

Licensed
Download PDF
201

Requires Authentication Unlicensed

Licensed
Download PDF
217

Requires Authentication Unlicensed

Licensed
Download PDF
227

Requires Authentication Unlicensed

Licensed
Download PDF
229

Requires Authentication Unlicensed

Licensed
Download PDF
257

Publishing information
Pages and Images/Illustrations in book
eBook published on:
January 23, 2017
eBook ISBN:
9781501505775
Paperback published on:
January 23, 2017
Paperback ISBN:
9781501514746
Pages and Images/Illustrations in book
Front matter:
14
Main content:
259
Illustrations:
9
Downloaded on 28.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9781501505775/html
Scroll to top button