feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Moses Mendelssohn Zentrum  (12)
  • HPol Brandenburg  (8)
  • SB Königs Wusterhausen
Type of Medium
Language
Region
Library
Virtual Catalogues
Subjects(RVK)
Access
  • 1
    UID:
    almahu_9949602262502882
    Format: 1 online resource (515 pages)
    Edition: 1st ed.
    ISBN: 9781484228968
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Additional Edition: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Philadelphia [u.a.] : Jewish Publ. Soc.
    UID:
    b3kat_BV011255982
    Format: XVI, 677 S. , Kt.
    Edition: 1. ed.
    ISBN: 0827605625
    Language: English
    Keywords: Marranen ; Religiöses Leben ; Marranen ; Geschichte
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949544896902882
    Format: 1 online resource (XIII, 319 p.)
    ISBN: 9783110711349 , 9783110766820
    Series Statement: Management, Spirituality and Religion , 1
    Content: Workplace spirituality is an emerging field of study and practice and this book asks the questions: Where have we been in the last ten years as a field and where should we be headed in the next ten years? The editors asked these questions of thought leaders from around the globe, leaders who represent different sectors, faith traditions, worldviews and organizational functions. This volume represents the best of current thinking about the state of the field of workplace spirituality and of what the future holds. There are four themes: (1) management themes such as leadership, ethics, change management, and diversity; (2) workplace spirituality in sectors such as health and wellbeing, policing and creative industries, (3) key issues that are emerging, such as self-spirituality, mindfulness, storytelling and the importance of nature, and (4) cutting edge epistemologies and methodologies including indigenous studies, relational ontology, ethnography, and psychodynamics. These articles were chosen to provoke new thinking, new research, and new practice in the field of workplace spirituality, with the goal of helping the field mature in the next decade.
    Note: Frontmatter -- , Acknowledgements -- , Foreword -- , Contents -- , Introduction -- , 1 The Past, Present and Future of Workplace Spirituality -- , 2 Introduction to Spirituality -- , Themes -- , 3 Leadership and Spirituality -- , 4 Ethics and Spirituality -- , 5 Spirituality and Religion: Influencing the Strategic Management Field of Research -- , 6 Organizational Change and Work Spirituality: Expanding the Moral Circle -- , 7 Organizational Behavior and Workplace Spirituality -- , 8 Spirituality at Work and Human Resource Management -- , 9 Family Business and Work Spirituality and Religion -- , 10 Gender and Diversity: Intersections of Faith, Religion, and Spirituality -- , Sectors -- , 11 Health and Wellbeing in the Context of Workplace Spirituality -- , 12 Workplace Spirituality and Policing -- , 13 Workplace Spirituality and Creative Industries -- , Key Issues -- , 14 (Western) Self-Spirituality: Literature Review, Conceptual Framework and Research Agenda -- , 15 Mindfulness and More: Spiritual Forms of Meditation -- , 16 Storytelling Nature-spirituality: An Autoethnographic Journey of Rediscovery -- , Epistemologies/Methodologies -- , 17 Indigenous Studies with an Integrative Research Approach -- , 18 Relating Differently: Exploring How a Relational Ontology Might Catalyze Transformative and Emancipatory Action- Oriented MSR Research -- , 19 Workplace Spirituality and the Ethnographic Gaze -- , 20 Psychodynamics and the Field of Management, Spirituality and Religion: Deciphering the Unconscious, Mapping the Soul -- , List of Figures -- , List of Tables -- , About the Authors -- , Index -- , MSR Journal , Issued also in print. , Mode of access: Internet via World Wide Web. , In English.
    In: DG Plus DeG Package 2022 Part 1, De Gruyter, 9783110766820
    In: EBOOK PACKAGE Business and Economics 2022 English, De Gruyter, 9783110992823
    In: EBOOK PACKAGE COMPLETE 2022 English, De Gruyter, 9783110993899
    In: EBOOK PACKAGE COMPLETE 2022, De Gruyter, 9783110994810
    In: EBOOK PACKAGE Economics 2022, De Gruyter, 9783110992922
    Additional Edition: ISBN 9783110711400
    Additional Edition: ISBN 9783110711295
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Cover
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    kobvindex_HPB80303923
    Format: 284 S. , 18 cm
    Edition: Dt. Erstausg.
    ISBN: 9783251011698 , 3251011693
    Series Statement: Haffmans-Taschenbuch 169 : Krimi
    Content: "Vic" Daniel aus Los Angeles übernimmt wirklich jeden Auftrag - Witziger Detektivroman
    Language: German
    Keywords: Krimis, Thriller, Spionage ; Belletristische Darstellung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    kobvindex_MMZa0054910+02
    Format: 537 S. : Ill.
    ISBN: 978-84-942925-8-3
    Series Statement: Caminos de leche y miel : jubilee volume in honor of Michael Studemund-Halévy
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    kobvindex_MMZmmz08428
    In: Sephardic and Mizrahi Jewry : from the golden age of Spain to modern times, (2005)S. 55-76
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    kobvindex_MMZa0074142
    In: _a0071774, (2020)S. 189-216
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    kobvindex_MMZa0074218
    In: _a0071769, (2017)S. 185-200
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    kobvindex_MMZa0034785
    Format: XII, 203 S.
    ISBN: 978-90-04-28448-7
    Series Statement: Jewish Latin America 5
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    kobvindex_MMZa0040344
    In: New Jewish Argentina : facets of Jewish experiences in the Southern cone, S. 264-291
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages