Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems
A timely technical guide to securing network-connected medical devices

In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area.

Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices.

Inside the book:

  • Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology
  • Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security
  • Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks

Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.

1146767959
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems
A timely technical guide to securing network-connected medical devices

In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area.

Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices.

Inside the book:

  • Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology
  • Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security
  • Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks

Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.

50.0 Pre Order
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

by John Chirillo
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

by John Chirillo

Paperback

$50.00 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on July 9, 2025

Related collections and offers


Overview

A timely technical guide to securing network-connected medical devices

In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area.

Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices.

Inside the book:

  • Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology
  • Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security
  • Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks

Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.


Product Details

ISBN-13: 9781394349418
Publisher: Wiley
Publication date: 07/09/2025
Pages: 592
Product dimensions: 7.30(w) x 9.10(h) x 1.30(d)

About the Author

JOHN CHIRILLO is an accomplished, published programmer and author with decades of hands-on experience. He’s a leading expert on medical device security who speaks regularly on regulatory compliance, risk assessment and mitigation, and incident management.

What People are Saying About This

From the Publisher

"This book is a comprehensive companion for anyone in healthcare. The insights you gain here will enhance your understanding and help drive the mission to create a safer, more secure healthcare environment for everyone."
—TOM BRAYS, Cybersecurity Analyst and Technical Editor

"This book is a masterful guide for navigating the challenges of securing healthcare environments, from physical spaces to digital systems. It empowers leaders to protect what matters most. A must-read for anyone committed to advancing the safety and integrity of our healthcare institutions."
—ROBERT BLAKE, President, E1

"I’ve worked in healthcare for over 30 years and this book is necessary reading."
—JEAN DWYER, RN and Clinical Educator in Labor & Delivery

"This book is vital for anyone navigating the intersection of healthcare and cybersecurity. With real-world insight and practical strategies, I can confidently say it belongs on every security leader’s shelf."
—T. MILLS, Chief Information Security Officer and Author

"I highly recommend this book as it illustrates the importance of cybersecurity in healthcare, ethical concerns, and how devastating life can be without it."
—DEB MARTIN, Privacy and Security Advisor

"This book unpacks the complexities of technologies in healthcare with a playbook of security strategies."
—RENEE VOGLEY, Director, Business Operations at Cardinal Health

"This book tackles Bluetooth and wireless communication vulnerabilities within connected medical device infrastructures. Moreover, it offers practical mitigation strategies such as encryption, secure device pairing, continuous network monitoring, and multi-factor authentication—solutions that align with modern cybersecurity best practices. Its clear structure makes it accessible to both technical professionals and non-technical audiences."
—PAM KENNEDY, Security Compliance Auditor and Technical Editor

"Whether you’re fortifying infrastructure or ensuring compliance in 2025’s stricter regulatory requirements, this book is an indispensable tool."
—KEVIN KNAPP, Sr. Cybersecurity Engineer

"John has done a phenomenal job creating a comprehensive treatise on IoMT threat management. This is a must-read for anyone dealing with the deployment and operational use of technology in healthcare. He adeptly covers the technical security challenges but does not stop there. Healthcare administrators, clinical staff, support, and even patients will find this book invaluable. Join John on the journey as he digs into the overall threat landscape, enumerating indicators of threat and attack while offering crucial guidance on best practices, security testing, policy, and response."
—STEVE NARDONE, Division Chief and head of the Trusted Product Evaluation Program at the NSA, Sr. Dir. Security and Compliance, Ret.

From the B&N Reads Blog

Customer Reviews