Book Image

Hands-On Industrial Internet of Things

By : Giacomo Veneri, Antonio Capasso
Book Image

Hands-On Industrial Internet of Things

By: Giacomo Veneri, Antonio Capasso

Overview of this book

We live in an era where advanced automation is used to achieve accurate results. To set up an automation environment, you need to first configure a network that can be accessed anywhere and by any device. This book is a practical guide that helps you discover the technologies and use cases for Industrial Internet of Things (IIOT). Hands-On Industrial Internet of Things takes you through the implementation of industrial processes and specialized control devices and protocols. You’ll study the process of identifying and connecting to different industrial data sources gathered from different sensors. Furthermore, you’ll be able to connect these sensors to cloud network, such as AWS IoT, Azure IoT, Google IoT, and OEM IoT platforms, and extract data from the cloud to your devices. As you progress through the chapters, you’ll gain hands-on experience in using open source Node-Red, Kafka, Cassandra, and Python. You will also learn how to develop streaming and batch-based Machine Learning algorithms. By the end of this book, you will have mastered the features of Industry 4.0 and be able to build stronger, faster, and more reliable IoT infrastructure in your Industry.
Table of Contents (18 chapters)

What is a DiD strategy?

Today, all companies have been effectively forced to consider the risks they face and evaluate the vulnerability of their assets with regard to their related potential economic impact. Once risks have been assessed, priorities can be established and a defense strategy can be arranged. This means that we need to adopt DiD logic, without being discouraged by the apparent difficulty of this approach. But what is DiD?

DiD is an approach to information security by which a security posture is achieved through the coordinated and combined use of multiple security countermeasures. It is based on the integration of three different categories of elements: people, technology, and operating methods. The redundancy and distribution of countermeasures is based on two main concepts: defense in multiple places and layered defenses.

These concepts are certainly not new...