Linked e-resources
Details
Table of Contents
Who is this book for?
What is Covered?
Introduction to IoT
What is IoT?
Why is IoT important?
Why now?
IoT and Digital Transformation
The role of IoT in modern businesses
Opportunities
Risks
It's an integration process: the human aspects of digital transformation
IT-OT Integration
Building trust is key
Business Models and Market analysis
Business and industrial market
The Shift to Software-based PLCs
Example: improve cost and reliability of a power distribution system with IoT
Example: enhance safety, security, and carbon footprint in an airport using IoT
Consumer market
Sources of Cost
Sources of Revenue
Matter, Formerly Known As Project Connected Home over IP (CHIP)
Example: improve quality of life and energy efficiency by smart thermostats
Connectivity choice and its impact on RoI
Climate Change and Performance per Watt
Data by-products beyond the original IoT application
Services and device management
Peripheral businesses
Marketing
Data Management
Analytics and AI
Developers
Security and safety
Security
Encryption techniques
Symmetric Encryption Algorithms
Asymmetric Encryption Algorithms
Software and Firmware Update Techniques
Random Key Generation
Software and Firmware Update Process
Key Management and Protection Against Known Threats
Security Attacks and Chain of Trust
Security Attacks
Chain of Trust
Incident Response
Blockchain
Summary of Best Security Practices for IoT Systems
Networking Concepts
Proxy
VPN
Firewall
DMZ
IoT Security Standards and Certificates
ioXT
UL
Matter, Formerly Known As Project Home over IP (CHIP)
Governmental Regulations and Other General Guidelines
IoT System Design Process and Main Components
Design and Deployment Process
Roles, Responsibilities, and Team Structure
Process
A Deeper Look
Sensors
Common Sensors
General Sensor Concepts
Filtering the Sensor Output
File Systems
Data in Motion vs. Data at Rest
Machine Learning
History and Background
Categories of Learning Algorithms
General Machine Learning Concepts
How a Machine Learning Model is Built
Overfitting
Dataset, Explainability, and Supervised Concepts
What is and what is not machine learning?
Machine Learning Architecture
Networking and Communication System, Product Lifecycle, Device Management
IoT System Architecture: Edge, Cloud, and Fog
Networking
Network Functions Virtualization and Software Defined Networks
Wireless Communication Protocols
Short range Wireless Protocols
Long range wireless protocols
Examples
Smart Video Doorbell
Energy Efficient Office
IoT Systems Life Cycle
The Process of Building a Data Product
What personas do you need on your team?
Business Understanding
Data Understanding
Data Preparation
Modeling
Evaluation
Deployment
The cycle repeats
CRISP-DM.
What is Covered?
Introduction to IoT
What is IoT?
Why is IoT important?
Why now?
IoT and Digital Transformation
The role of IoT in modern businesses
Opportunities
Risks
It's an integration process: the human aspects of digital transformation
IT-OT Integration
Building trust is key
Business Models and Market analysis
Business and industrial market
The Shift to Software-based PLCs
Example: improve cost and reliability of a power distribution system with IoT
Example: enhance safety, security, and carbon footprint in an airport using IoT
Consumer market
Sources of Cost
Sources of Revenue
Matter, Formerly Known As Project Connected Home over IP (CHIP)
Example: improve quality of life and energy efficiency by smart thermostats
Connectivity choice and its impact on RoI
Climate Change and Performance per Watt
Data by-products beyond the original IoT application
Services and device management
Peripheral businesses
Marketing
Data Management
Analytics and AI
Developers
Security and safety
Security
Encryption techniques
Symmetric Encryption Algorithms
Asymmetric Encryption Algorithms
Software and Firmware Update Techniques
Random Key Generation
Software and Firmware Update Process
Key Management and Protection Against Known Threats
Security Attacks and Chain of Trust
Security Attacks
Chain of Trust
Incident Response
Blockchain
Summary of Best Security Practices for IoT Systems
Networking Concepts
Proxy
VPN
Firewall
DMZ
IoT Security Standards and Certificates
ioXT
UL
Matter, Formerly Known As Project Home over IP (CHIP)
Governmental Regulations and Other General Guidelines
IoT System Design Process and Main Components
Design and Deployment Process
Roles, Responsibilities, and Team Structure
Process
A Deeper Look
Sensors
Common Sensors
General Sensor Concepts
Filtering the Sensor Output
File Systems
Data in Motion vs. Data at Rest
Machine Learning
History and Background
Categories of Learning Algorithms
General Machine Learning Concepts
How a Machine Learning Model is Built
Overfitting
Dataset, Explainability, and Supervised Concepts
What is and what is not machine learning?
Machine Learning Architecture
Networking and Communication System, Product Lifecycle, Device Management
IoT System Architecture: Edge, Cloud, and Fog
Networking
Network Functions Virtualization and Software Defined Networks
Wireless Communication Protocols
Short range Wireless Protocols
Long range wireless protocols
Examples
Smart Video Doorbell
Energy Efficient Office
IoT Systems Life Cycle
The Process of Building a Data Product
What personas do you need on your team?
Business Understanding
Data Understanding
Data Preparation
Modeling
Evaluation
Deployment
The cycle repeats
CRISP-DM.