A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
Key FeaturesThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.