did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781098370190

Digital Transformers Digital Transformation Begins with Device Transformation

by
  • ISBN13:

    9781098370190

  • ISBN10:

    1098370198

  • Format: Hardcover
  • Copyright: 2021-06-19
  • Publisher: BookBaby
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $42.67 Save up to $0.04
  • Buy New
    $42.63
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

Smart devices designed for the Internet of Things (IoT), industrial IoT, and operational technology (OT) in the emerging era of digital transformation require protection by design for cyber resilience. Cyberattacks by nation state actors and cybercrime syndicates cause system outages and disruption of essential services. This book is a call to action – for silicon chip makers, equipment manufacturers, managed security service providers, device owners and operators, to begin the journey towards collaborative cyber protection.

The traditional information technology (IT) detection and prevention methods based on threat models are inadequate to defend the billions of devices that are an intrinsic part of our daily regimen. It's essential to adopt protection models based on risk for modernization across all sectors – smart factories, smart cities, smart grids, smart transportation, smart homes, healthcare systems, aviation systems, public utility systems, defense systems, and law enforcement systems.

The power of scientific and technological innovations offers opportunities to transform and reform the way things are and the way they ought to be. If the past three decades are a gauge of the power of innovation, then the next three decades will be a harbinger of the power of transformation.

Over the years, there have been multiple waves of technological evolution. We've seen evolutions from analog to digital over copper, and then from copper to fiber, and fiber to wireless. Soon after that, we advanced from on-premises to cloud data centers, and then from local applications to online applications, then local storage advanced to cloud storage. All these advancements were remarkable endeavors.

The second wave of inventions included virtualization, cloud computing, high speed connections, software defined networking, online applications and remote services. All these advancements have shaped a global economy.

This book emphasizes that the third wave is coming. Recent advances in silicon technologies, field-programmable gate arrays, edge computing, zero trust models, artificial intelligence (AI) and machine learning (ML) collectively provide a platform for digital transformation at scale. Data is the new oil and explicit trust in data is paramount. Devices power every aspect of our daily living – at home, in public and at work – and explicit trust in devices is imperative.

"Digital Transformers" is a must-read for anyone with an interest in the rise of technological advancements and the inherent need for cybersecurity keep up with the on-going processes of digital transformation.

Author Biography

Srinivas Kumar is the Chief Technology and Product Officer at Mocana Corporation and has more than 30 years of hands-on engineering and management experience in computer networking and security.

Prior to joining Mocana, he was the CTO of TaaSera. He founded TaaSware in 2011 (acquired by TaaSera in 2012). During his time at TaaSware he served as an entrepreneur-in-residence at SRI International. Prior to that, he was a solutions architect in the networking and security business unit at VMware. He was previously the VP of engineering and solutions architect for identity-based access controls at Applied Identity, until it was acquired by Citrix. He has served in senior project and architect roles at Nortel, Lucent and TranSwitch. Earlier in his career, as engineering manager at Firearms Training Systems (acquired by Meggitt Training Systems), he led the design and development of real time marksmanship and squad engagement simulators for training law enforcement personnel and the military.

He holds 28 U.S. patents in the field of cyber-protection for IoT, cybersecurity, user and application identity-based access controls, network and endpoint security, and evidence based predictive analytics. He has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards. He holds a BE degree in electrical engineering from Bombay University, and an MS degree in electrical and computer engineering from Clemson University.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program