Fr. 65.00

Preventing Bluetooth and Wireless Attacks in Iomt Healthcare Systems

Inglese · Tascabile

Pubblicazione il 01.08.2025

Descrizione

Ulteriori informazioni










A tactical and technical guide to securing network-connected medical devices Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, by John Chirillo, is an authoritative and up-to-date discussion of how to secure network-connected medical devices. Chirillo explains the relevant attack vectors, detection and prevention strategies, likely future trends, emerging threats, and the legal, regulatory, and ethical considerations that most frequently arise for professionals in this area. Beginning with an accessible introduction to the field of Internet of Medical Things devices and their recent evolution, the book moves on to a detailed and technical discussion of how to prevent the most common-and lesser known-attacks against these devices. The author offers real-world scenarios, examples, and case studies that describe the tools, techniques, and strategies you can employ immediately to improve your organization's security and mitigate risk. Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is perfect for cybersecurity professionals, healthcare-involved IT leadership and specialists, and medical researchers interested in protecting sensitive personal data and vital medical infrastructure.

Sommario










Preface xxvii
Foreword xxix
Part I Foundation 1
Chapter 1 Introduction to IoMT in Healthcare 3
Chapter 2 The Evolving Landscape of Wireless Technologies in Medical Devices 23
Chapter 3 Introduction to Bluetooth and Wi-Fi in Healthcare 46
Part II Attack Vectors 65
Chapter 4 Bluetooth Vulnerabilities, Tools, and Mitigation Planning 67
Chapter 5 Wi-Fi and Other Wireless Protocol Vulnerabilities 104
Chapter 6 Man-in-the-Middle Attacks on Medical Devices 161
Chapter 7 Replay and Spoofing Attacks in IoMT 196
Chapter 8 Denial of Service in Wireless Medical Networks 208
Part III Case Studies and Real-World Scenarios 227
Chapter 9 Pacemaker Hacking 229
Chapter 10 Insulin Pump Vulnerabilities and Exploits 247
Chapter 11 Attack Vector Trends and Hospital Network Breaches with IoMT Devices 263
Part IV Detection and Prevention 295
Chapter 13 Intrusion Detection and Prevention for IoMT Networks 297
Chapter 14 Machine Learning Approaches to Wireless Attack Detection 338
Chapter 15 Secure Communication Protocols for Medical Devices 366
Chapter 16 Best Practices for IoMT Device Security 391
Part V Future Trends and Emerging Threats 441
Chapter 17 5G and Beyond and Implications for IoMT Security 443
Chapter 18 Quantum Computing in Medical Device Security 459
Chapter 19 AI-Driven Attacks and Defenses in Healthcare 476
Part VI Legal and Ethical Considerations 491
Chapter 20 Regulatory Frameworks for IoMT Security 493
Chapter 21 Guidelines for Ethical Hacking in Healthcare 510
Conclusion 525
Index 527


Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.