Securing the IoT Secure Architectures

with Malcolm Shore
online class - 2017

Learn about security architecture for IoT, and its realization in the context of a medium to large-scale deployment of Internet of Things devices.

Saved in:

Holdings -

Bibliographic Details
Corporate Author: Lynda.com (Firm)
Other Authors: Shore, Malcolm (Speaker)
Format: Electronic Video
Language:English
Published: Carpenteria, CA lynda.com, 2017.
Subjects:
Online Access:Click here for information and access to this online class.

MARC

LEADER 00000467 a2200000 4500
001 LDC601810
003 LDC
005 20190307125500.0
006 m c
007 cr cna a
008 170811s2017 cau125 o vleng d
949 |a dt 
040 |a lynda.com  |b eng 
092 0 |a ONLINE CLASS 
100 1 |a Shore, Malcolm,  |e speaker. 
245 1 0 |a Securing the IoT: Secure Architectures.  |h [online class] /  |c with Malcolm Shore 
264 1 |a Carpenteria, CA  |b lynda.com,  |c 2017. 
264 4 |c ℗♭2017 
306 |a 02:05:01 
336 |a two-dimensional moving image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 0 |a 08/10/2017 
511 |a Presenter: Malcolm Shore. Malcolm Shore is a cybersecurity expert who spent ten years as a director at New Zealand's GCSB. Dr. Shore was the principal security officer at the Australian National Broadband Network Company and the director of education and community relations for the Australian Information Security Association. He's currently a technical director at BAE Systems Applied Intelligence, and an educator in the fields of forensics, information warfare, security management, and applied cryptography. He holds a PhD in information security. 
520 |a Learn about security architecture for IoT, and its realization in the context of a medium to large-scale deployment of Internet of Things devices. 
520 |a IoT is one of the biggest new developments in IT, with growth expected to reach billions of devices in the short term. There is, however, a major gap in understanding of security for IoT. Many first-wave IoT systems are showing significant security weaknesses, and security is often recognized as one of the key blockers to successful IoT deployments. In this course, Malcolm Shore provides guidance for businesses intending to deploy IoT solutions on the end-to-end security architecture required to ensure the comprehensive security of their deployment. He provides an introduction to security architecture and discusses emerging IoT reference architecture, domain specific architecture, proximity network services, and more. 
538 |a Latest version of the following browsers: Chrome, Safari,Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScriptand cookies must be enabled. A broadband Internet connection. 
653 |a Streaming video 
653 |a IT 
653 |a Security 
710 2 |a Lynda.com (Firm) 
856 4 0 |u http://www.lynda.com/IT-Infrastructure-tutorials/Securing-IoT-Secure-Architectures/601810-2.html?org=spokanelibrary.org&utm_source=marc  |z View course details on lynda.com  |y Click here for information and access to this online class.  |z You will be leaving Spokane Public Library's website.  |t 0 
998 |a 2017.08.16 
999 f f |i d17d8b04-1072-55b0-b7bc-b6441c88030b  |s 22767e64-077d-5087-b467-a9f851bc7049  |t 0