End-to-End IoT Security: Authentication, Vulnerability Exploration and Data Analysis Subtitle
By : Shaurya Dave
Book Info