Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

The Industrial Internet of Things (IIoT) is the integration of traditional Internet of Things (IoT) principles with industrial sectors and applications. This convergence has revolutionized industrial operations, enabling remote monitoring and control of critical infrastructure, enhanced data analytics, and optimized decision-making. However, the vast and diverse IoT landscape has also introduced new security challenges.This book presents a comprehensive overview of security concerns in the IIoT, with a focus on developing and deploying lightweight and efficient intrusion detection and prevention systems (IDPSs) for edge devices. The book begins by introducing the fundamentals of IoT and IIoT, including architectures, protocols, and applications. It then discusses the unique security challenges posed by edge devices, such as resource constraints, limited processing power, and unreliable connectivity.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
The Industrial Internet of Things (IIoT) is the integration of traditional Internet of Things (IoT) principles with industrial sectors and applications. This convergence has revolutionized industrial operations, enabling remote monitoring and control of critical infrastructure, enhanced data analytics, and optimized decision-making. However, the vast and diverse IoT landscape has also introduced new security challenges.This book presents a comprehensive overview of security concerns in the IIoT, with a focus on developing and deploying lightweight and efficient intrusion detection and prevention systems (IDPSs) for edge devices. The book begins by introducing the fundamentals of IoT and IIoT, including architectures, protocols, and applications. It then discusses the unique security challenges posed by edge devices, such as resource constraints, limited processing power, and unreliable connectivity.