Jump to content

Dear members, finally, we decided to refresh our theme. Decision was brought based on multiple factors, primarily because of technical needs as old one is not compatible with a new platform version, but also because you all asked for a darker theme.
Here you go!

Please head here if you want to vote https://www.elite7hackers.net/topic/411861-the-new-theme/


This site uses cookies! Learn More

This site uses cookies!

For providing our services, we do use cookies.
But get used, this is what most of modern web do!
However we have to warn you since we are obligated to so due to EU laws.

By continuing to use this site, you agree to allow us to store cookies on your computer. :)
And no, we will not eat your computer nor you will be able to eat those cookies :P


Practical Industrial Internet of Things Security

Recommended Posts


Practical Industrial Internet of Things Security by Sravani Bhattacharjee
English | 27 July 2018 | ISBN: 178883268X | 324 Pages | EPUB | 6.76 MB

Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.

Key Features
Gain practical insight into security concepts in the Industrial Internet of Things (IIoT) architecture
Demystify complex topics such as cryptography and blockchain
Comprehensive references to industry standards and security frameworks when developing IIoT blueprints
Book Description
Securing connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud.

This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You'll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities.

What you will learn
Understand the crucial concepts of a multi-layered IIoT security framework
Gain insight on securing identity, access, and configuration management for large-scale IIoT deployments
Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity
Build a concrete security program for your IIoT deployment
Explore techniques from case studies on industrial IoT threat modeling and mitigation approaches
Learn risk management and mitigation planning
Who this book is for
Practical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.

Table of Contents
An Unprecedented Opportunity at Stake
Industrial Data Pipeline and Security Architecture
IIoT Identity and Access Management
Endpoint Security and Trustworthiness
Securing Connectivity and Communications
Securing IIoT Edge, Cloud and Apps
Secure Processes and Governance
IIoT Security using Emerging Technologies
IIoT Security: Real World Case Studies
The Road Ahead
Appendix I
Appendix II



Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Elite7Hackers Netwok

Hack the imagination!

Support and inquiries

Open support ticket here or email us at [email protected]


Highlighted/recommended lights


Important Information

By using this site, you agree to our Privacy Policy and Terms of Use.