Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Edge Analytics with Azure IoT

You're reading from   Hands-On Edge Analytics with Azure IoT Design and develop IoT applications with edge analytical solutions including Azure IoT Edge

Arrow left icon
Product type Paperback
Published in May 2020
Publisher Packt
ISBN-13 9781838829902
Length 262 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Colin Dow Colin Dow
Author Profile Icon Colin Dow
Colin Dow
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Section 1: Getting Started with Edge Analytics
2. Introduction to Edge Analytics FREE CHAPTER 3. How Does IoT Edge Analytics Work? 4. Communications Protocols Used in Edge Analytics 5. Section 2: Understanding Edge Analytics Technologies
6. Working with Microsoft Azure IoT Hub 7. Using the Raspberry Pi with Azure IoT Edge 8. Using MicroPython for Edge Analytics 9. Machine Learning and Edge Analytics 10. Designing a Smart Doorbell with Visual Recognition 11. Section 3: The Road Ahead
12. Security and Privacy in an Edge Analytics World 13. What Next? 14. Other Books You May Enjoy

Questions

Having read this chapter, try answering the following questions on your own:

  1. True/False. The code used in the Mirai botnet attack in 2016 was released to the public in order to create plausible deniability for the creators.
  2. True/False. A command and control server is used in DDoS attacks.
  3. What is a cross-site scripting attack?
  4. Name three of the possible types of attacks against our edge analytics applications.
  5. True/False. A sniffer is a type of spying tool that is set up between our internet router and edge computer.
  6. How does a cyber criminal trick you into giving them your username and password when you log on to a legitimate website?
  7. True/False. A physical key switch can be used as a form of security protection on our edge device.
  8. What are some of the libraries that we can use to write a machine learning module?
  9. True/False. The name of the Microsoft tool used to monitor...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime