000 | 01618cam a2200277zu 4500 | ||
---|---|---|---|
001 | 88852723 | ||
003 | FRCYB88852723 | ||
005 | 20250107224705.0 | ||
006 | m o d | ||
007 | cr un | ||
008 | 250107s2015 fr | o|||||0|0|||eng d | ||
020 | _a9781783553532 | ||
035 | _aFRCYB88852723 | ||
040 |
_aFR-PaCSA _ben _c _erda |
||
100 | 1 | _aWaher, Peter | |
245 | 0 | 1 |
_aLearning Internet of Things _c['Waher, Peter'] |
264 | 1 |
_bPackt Publishing _c2015 |
|
300 | _a p. | ||
336 |
_btxt _2rdacontent |
||
337 |
_bc _2rdamdedia |
||
338 |
_bc _2rdacarrier |
||
650 | 0 | _a | |
700 | 0 | _aWaher, Peter | |
856 | 4 | 0 |
_2Cyberlibris _uhttps://international.scholarvox.com/netsen/book/88852723 _qtext/html _a |
520 | _aThis book starts by exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. You will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. Thing registries and delegation of trust are introduced as important tools to secure the life cycle of Things on the Internet. Once the fundamentals have been mastered, your focus will move to the Internet of Things architecture. A secure architecture is proposed that will take full advantage of the power of Internet of Things and at the same time protect end user integrity and private personal data without losing flexibility and interoperability.This book provides you with a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things. | ||
999 |
_c68990 _d68990 |