Swipe to navigate through the chapters of this book
As you have learned so far in this book, Internet of Things (IoT) technologies can be used to expand the conveniences in people’s lives. Compared to a few years ago, these devices have increased in their capabilities, as have the barriers of entry to creating a device. In this book alone, you have already taken advantage of an Arduino, Raspberry Pi, and iPhone as IoT sensors.
Please log in to get access to this content
To get access to this content you need the following product:
Elie Bursztein, “Inside the infamous Mirai IoT Botnet,” Cloudflare, https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/, September 8, 2018.
- Using Face ID, Touch ID, and Keychain Services to Secure Your Apps
- Sequence number
- Chapter number
- Chapter 11