Abstract
As you have learned so far in this book, Internet of Things (IoT) technologies can be used to expand the conveniences in people’s lives. Compared to a few years ago, these devices have increased in their capabilities, as have the barriers of entry to creating a device. In this book alone, you have already taken advantage of an Arduino, Raspberry Pi, and iPhone as IoT sensors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Elie Bursztein, “Inside the infamous Mirai IoT Botnet,” Cloudflare, https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/, September 8, 2018.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Ahmed Bakir
About this chapter
Cite this chapter
Bakir, A. (2018). Using Face ID, Touch ID, and Keychain Services to Secure Your Apps. In: Program the Internet of Things with Swift for iOS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3513-3_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3513-3_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3512-6
Online ISBN: 978-1-4842-3513-3
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)