Abstract
As you have learned so far in this book, Internet of Things (IoT) technologies can be used to expand the conveniences in people’s lives. Compared to a few years ago, these devices have increased in their capabilities, as have the barriers of entry to creating a device. In this book alone, you have already taken advantage of an Arduino, Raspberry Pi, and iPhone as IoT sensors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Elie Bursztein, “Inside the infamous Mirai IoT Botnet,” Cloudflare, https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/, September 8, 2018.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Ahmed Bakir
About this chapter
Cite this chapter
Bakir, A. (2018). Using Face ID, Touch ID, and Keychain Services to Secure Your Apps. In: Program the Internet of Things with Swift for iOS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3513-3_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3513-3_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3512-6
Online ISBN: 978-1-4842-3513-3
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)