Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time

Buy
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. 

Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices.

There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. 

What You’ll Learn

  • Create a secure, operational Raspberry Pi IoT sensor
  • Configure and train the sensor using “normal” IoT behavior
  • Establish analytics for detecting aberrant activities
  • Generate real-time alerts to preempt attacks
  • Identify and report data-leakage events originating from IoT devices
  • Develop custom Python applications for cybersecurity

Who This Book Is For

Cybersecurity specialists, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, software developers and engineers developing new cybersecurity defenses, incident response teams, software developers and engineers in general, and hobbyists wanting to expand the application of Raspberry Pi into both IoT and cybersecurity
(HTML tags aren't allowed.)

Professional Event Coordination (The Wiley Event Management Series)
Professional Event Coordination (The Wiley Event Management Series)

Introducing a clear path toward event excellence

A comprehensive guide to essential competencies for event coordinators

Professional Event Coordination examines the full event planning process and provides the tools and strategies to effectively procure, organize, implement, and monitor all the products, services, and...

Absolute Java (3rd Edition)
Absolute Java (3rd Edition)

  Praised for providing an engaging balance of complete examples and explanatory discussion, Absolute Java, Third Edition, is the most comprehensive and accessible book available to both the novice and intermediate Java programming reader. Best-selling author Walt Savitch delivers concepts and techniques in a clear and...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Algorithms on Strings
Algorithms on Strings
'perfect for lectures on 'stringology', for graduate students as a reference on the topic and for appliers in linguistic or molecular biology' Acta Scientiarum Mathematicarum

This text and reference on string processes and pattern matching presents examples related to the automatic processing of natural language, to the
...
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.

Welcome to Sams Teach Yourself Microsoft Office
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy