Mastering IOT: Build modern IoT solutions that secure and monitor your IoT infrastructure

Mastering IOT: Build modern IoT solutions that secure and monitor your IoT infrastructure
Mastering IOT: Build modern IoT solutions that secure and monitor your IoT infrastructure by Colin Dow
English | 2019 | ISBN: 1838645434 | 782 Pages | EPUB | 1167 MB

Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organization
The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people’s well-being.
We’ll begin our journey with an introduction to Raspberry Pi and quickly jump right into Python programming. We’ll learn all concepts through multiple projects, and then reinforce our learnings by creating an IoT robot car. We’ll examine modern sensor systems and focus on what their power and functionality can bring to our system. We’ll also gain insight into cloud and fog architectures, including the OpenFog standards. The Learning Path will conclude by discussing three forms of prevalent attacks and ways to improve the security of our IoT infrastructure.
By the end of this Learning Path, we will have traversed the entire spectrum of technologies needed to build a successful IoT system, and will have the confidence to build, secure, and monitor our IoT infrastructure.
This Learning Path includes content from the following Packt products:

  • Internet of Things Programming Projects by Colin Dow
  • Internet of Things for Architects by Perry Lea

What you will learn

  • Build a home security dashboard using an infrared motion detector
  • Receive data and display it with an actuator connected to the Raspberry Pi
  • Build an IoT robot car that is controlled via the Internet
  • Use IP-based communication to easily and quickly scale your system
  • Explore cloud protocols, such as Message Queue Telemetry Transport (MQTT) and CoAP
  • Secure communication with encryption forms, such as symmetric key