Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Demystifying intelligent multimode s...
~
Booth, Jody.
Linked to FindBook
Google Book
Amazon
博客來
Demystifying intelligent multimode security systems = an edge-to-cloud cybersecurity solutions guide /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Demystifying intelligent multimode security systems/ by Jody Booth ... [et al.].
Reminder of title:
an edge-to-cloud cybersecurity solutions guide /
other author:
Booth, Jody.
Published:
Berkeley, CA :Apress : : 2023.,
Description:
xix, 284 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction -- Chapter 1: Introduction and Overview -- Chapter 2: Architecting an E2E IMSS Data Pipeline -- Chapter 3: Architecting an E2E DSS Data Pipeline -- Chapter 4: Securing the IMSS Assets -- Chapter 5: Machine Learning Security -- Chapter 6: Sample Applications -- Chapter 7: Looking Into the Future -- Chapter 8: As We Go To Press.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-1-4842-8297-7
ISBN:
9781484282977
Demystifying intelligent multimode security systems = an edge-to-cloud cybersecurity solutions guide /
Demystifying intelligent multimode security systems
an edge-to-cloud cybersecurity solutions guide /[electronic resource] :by Jody Booth ... [et al.]. - Berkeley, CA :Apress :2023. - xix, 284 p. :ill., digital ;24 cm.
Introduction -- Chapter 1: Introduction and Overview -- Chapter 2: Architecting an E2E IMSS Data Pipeline -- Chapter 3: Architecting an E2E DSS Data Pipeline -- Chapter 4: Securing the IMSS Assets -- Chapter 5: Machine Learning Security -- Chapter 6: Sample Applications -- Chapter 7: Looking Into the Future -- Chapter 8: As We Go To Press.
Open access.
Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples' homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS -- Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment.
ISBN: 9781484282977
Standard No.: 10.1007/978-1-4842-8297-7doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Demystifying intelligent multimode security systems = an edge-to-cloud cybersecurity solutions guide /
LDR
:03448nmm a2200337 a 4500
001
2333412
003
DE-He213
005
20230727125047.0
006
m d
007
cr nn 008maaau
008
240402s2023 cau s 0 eng d
020
$a
9781484282977
$q
(electronic bk.)
020
$a
9781484282960
$q
(paper)
024
7
$a
10.1007/978-1-4842-8297-7
$2
doi
035
$a
978-1-4842-8297-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D389 2023
245
0 0
$a
Demystifying intelligent multimode security systems
$h
[electronic resource] :
$b
an edge-to-cloud cybersecurity solutions guide /
$c
by Jody Booth ... [et al.].
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xix, 284 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Introduction -- Chapter 1: Introduction and Overview -- Chapter 2: Architecting an E2E IMSS Data Pipeline -- Chapter 3: Architecting an E2E DSS Data Pipeline -- Chapter 4: Securing the IMSS Assets -- Chapter 5: Machine Learning Security -- Chapter 6: Sample Applications -- Chapter 7: Looking Into the Future -- Chapter 8: As We Go To Press.
506
$a
Open access.
520
$a
Use this practical guide to understand the concepts behind Intelligent Multimode Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a billion active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples' homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS -- Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Computer Science.
$3
626642
700
1
$a
Booth, Jody.
$3
3664119
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8297-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9459617
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login