Books > Computing & IT > Computer communications & networking
|
Buy Now
The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Loot Price: R3,486
Discovery Miles 34 860
|
|
The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Expected to ship within 12 - 17 working days
|
As more and more devices become interconnected through the Internet
of Things (IoT), there is an even greater need for this book,which
explains the technology, the internetworking, and applications that
are making IoT an everyday reality. The book begins with a
discussion of IoT "ecosystems" and the technology that enables
them, which includes: Wireless Infrastructure and Service Discovery
Protocols Integration Technologies and Tools Application and
Analytics Enablement Platforms A chapter on next-generation cloud
infrastructure explains hosting IoT platforms and applications. A
chapter on data analytics throws light on IoT data collection,
storage, translation, real-time processing, mining, and analysis,
all of which can yield actionable insights from the data collected
by IoT applications. There is also a chapter on edge/fog computing.
The second half of the book presents various IoT ecosystem use
cases. One chapter discusses smart airports and highlights the role
of IoT integration. It explains how mobile devices, mobile
technology, wearables, RFID sensors, and beacons work together as
the core technologies of a smart airport. Integrating these
components into the airport ecosystem is examined in detail, and
use cases and real-life examples illustrate this IoT ecosystem in
operation. Another in-depth look is on envisioning smart healthcare
systems in a connected world. This chapter focuses on the
requirements, promising applications, and roles of cloud computing
and data analytics. The book also examines smart homes, smart
cities, and smart governments. The book concludes with a chapter on
IoT security and privacy. This chapter examines the emerging
security and privacy requirements of IoT environments. The security
issues and an assortment of surmounting techniques and best
practices are also discussed in this chapter.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.