Torrent details for "Chirillo J. Preventing Bluetooth and Wireless Attacks..IoMT Heal…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
13.7 MB
Info Hash:
372FFA977FDCEEF6BADEC2D60AF50A2DA2150AF2
Added By:
Added:
June 23, 2025, 1:33 p.m.
Stats:
|
(Last updated: June 23, 2025, 1:34 p.m.)
| File | Size |
|---|---|
| ['Chirillo J. Preventing Bluetooth and Wireless Attacks..IoMT Healthcare Sys. 2025.pdf'] | 0 bytes |
Name
DL
Uploader
Size
S/L
Added
-
13.7 MB
[35
/
15]
2025-06-23
| Uploaded by andryold1 | Size 13.7 MB | Health [ 35 /15 ] | Added 2025-06-23 |
NOTE
SOURCE: Chirillo J. Preventing Bluetooth and Wireless Attacks..IoMT Healthcare Sys. 2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format A timely technical guide to securing network-connected medical devices In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area. Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions―including common real-world scenarios, examples, and case studies―on how to prevent both common and unusual attacks against these devices. Inside the book: Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices
×


