September 2018
Intermediate to advanced
412 pages
11h 12m
English
IoT implementations will have many API offerings to manage data movement between devices, backend systems, and apps. It is critical that these APIs are secure enough to provide the right level of access to the relevant developers and users of these APIs, otherwise these APIs can become a backdoor entry for hackers. Proper authentication and authorization of data movement through these APIs, as well as management of these APIs, is very critical and should be addressed comprehensively.