Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Internet of Things

You're reading from  Mastering Internet of Things

Product type Book
Published in Mar 2018
Publisher Packt
ISBN-13 9781788397483
Pages 410 pages
Edition 1st Edition
Languages
Author (1):
Peter Waher Peter Waher
Profile icon Peter Waher
Toc

Table of Contents (24) Chapters close

Title Page
Copyright and Credits
Dedication
Packt Upsell
Contributors
Preface
1. Preparing Our First Raspberry Pi Project 2. Creating a Sensor to Measure Ambient Light 3. Creating an Actuator for Controlling Illumination 4. Publishing Information Using MQTT 5. Publishing Data Using HTTP 6. Creating Web Pages for Your Devices 7. Communicating More Efficiently Using CoAP 8. Interoperability 9. Social Interaction with Your Devices Using XMPP 10. The Controller 11. Product Life Cycle 12. Concentrators and Bridges 13. Using an Internet of Things Service Platform 14. IoT Harmonization 15. Security for the Internet of Things 16. Privacy 1. Other Books You May Enjoy Index

Understanding the risks


James Clapper, former director of National Intelligence of the USA, told Popular Science in 2016 that America's Greatest Threat is the Internet of Things. And the list of threats to America is not small.

The reason for this statement is that our society is so automated and optimized. Vulnerabilities in things make it possible to disrupt services, logistics, communication, energy, and the economy. It is possible to paralyze a modern society, using vulnerabilities in the systems used to make it run.

Today, hospital equipment, health devices, utilities, transport, trains, ships, cars, vans, airplanes, power plants, nuclear facilities, grocery stores, railways, motorways, harbors, and so on are to some extent automated. And they will be more so in the future, some even becoming autonomous, running without human intervention. And many of these systems contain serious vulnerabilities, sometimes known, but most often unknown to the creators, but not to cyber warriors. Many...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime