Full description not available
S**I
Excellent book that covers all the way from basics to deep dive on technical details
Syed Rehan's book covers IoT, Edge ML, and Cybersecurity all the way from fundamentals to deep technical discussions. I was looking for a book that will enable me to learn IoT and Edge Computing from the fundamentals to details, and I could not have expected for a book better than this one. The code samples were very useful in trying out projects of my own and gaining practical knowledge.
K**N
Not a good reference for AWS IoT security
I was quite disappointed reading this book, the main concept of zero trust is not well described and can create major issues in your IoT deployments if not added properly, book lacks production level quality with real world samples, unfortunately I spent too much time on the book to find reasonable tutorials to use in my real project.
H**N
Non practical and not cohesive
We produce IoT devices, and my expectations were high when I purchased this book. I anticipated advanced insights into threat modeling and IoT defense patterns, but unfortunately, I am greatly disappointed.The book focuses predominantly on AWS, but its exploration of other cloud platforms is superficial. Its practical applications for those in IoT manufacturing or security are minimal; I estimate about 99% of the content to be inapplicable.In terms of theoretical background, I suggest Rehan enhance the book with foundational knowledge of IoT, ML, and cybersecurity. This would provide readers with a solid understanding of the principles before delving into practical applications.A significant omission is the lack of real-world case studies. Incorporating these would demonstrate how the concepts apply across various industries.For beginners, the book is not user-friendly. It would be beneficial to include sections that offer step-by-step guidance on basic concepts and tools, especially for educational purposes.Regarding advanced topics, the book falls short. It should cover complex cybersecurity threats and state-of-the-art ML techniques in IoT for more experienced readers.The book also lacks interactive learning resources, such as video tutorials or interactive labs, which would greatly enhance the learning experience.Given the rapid evolution of technology, the book should be updated periodically, or supplemented with an online resource to keep the content current. This aspect is severely lacking.Finally, community engagement is essential. Creating a platform for readers to discuss topics, share experiences, and ask questions would foster a community of learners and professionals. Security is a fast-moving field, and without community involvement, it's challenging to apply these concepts effectively.
Trustpilot
1 week ago
4 days ago