January 2018
Intermediate to advanced
524 pages
13h 33m
English
Many IoT deployments will be in remote and isolated areas leaving sensors and edge routers vulnerable to physical attack. Additionally, the hardware itself needs modern protection mechanisms common in processors and the circuitry of mobile devices and personal electronics.
Read now
Unlock full access