Home > readwriteweb > IBM’s Andy Piper (Part 2): How MQTT Averts a ‘Thing-in-the-Middle’ Attack

IBM’s Andy Piper (Part 2): How MQTT Averts a ‘Thing-in-the-Middle’ Attack

November 22nd, 2011 11:46 Leave a comment Go to comments