Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New customer? Register
Subtotal: 0.00
Total Items In Cart:
Introduces a set of novel risk assessment techniques and their role in the IoT security risk management process. Specifically, the book presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm.