![Lesson 2 – BLE profiles, services, characteristics, device roles and network topology – Embedded Centric Lesson 2 – BLE profiles, services, characteristics, device roles and network topology – Embedded Centric](https://embeddedcentric.com/wp-content/uploads/2019/05/BLE-Communication-Options.png)
Lesson 2 – BLE profiles, services, characteristics, device roles and network topology – Embedded Centric
![Bluetooth Low Energy (BLE) IoT Mobile Application with AWS Amplify, AWS IoT and Swift | Front-End Web & Mobile Bluetooth Low Energy (BLE) IoT Mobile Application with AWS Amplify, AWS IoT and Swift | Front-End Web & Mobile](https://d2908q01vomqb2.cloudfront.net/0a57cb53ba59c46fc4b692527a38a87c78d84028/2021/08/04/architecture.png)
Bluetooth Low Energy (BLE) IoT Mobile Application with AWS Amplify, AWS IoT and Swift | Front-End Web & Mobile
![LinTech Bluetooth Low Energy SPP USB Adapter; Serial Port Profile Emulation über USB zu Bluetooth; BLE Central oder Peripheral konfigurierbar; integrierte Antenne; Class 1: Amazon.de: Computer & Zubehör LinTech Bluetooth Low Energy SPP USB Adapter; Serial Port Profile Emulation über USB zu Bluetooth; BLE Central oder Peripheral konfigurierbar; integrierte Antenne; Class 1: Amazon.de: Computer & Zubehör](https://m.media-amazon.com/images/I/71rthKtXAyL._AC_UF894,1000_QL80_.jpg)
LinTech Bluetooth Low Energy SPP USB Adapter; Serial Port Profile Emulation über USB zu Bluetooth; BLE Central oder Peripheral konfigurierbar; integrierte Antenne; Class 1: Amazon.de: Computer & Zubehör
![How to Implement Bluetooth Low Energy Security and Privacy in Wireless Devices - Contract Engineering, Product Design & Development Company - Cardinal Peak How to Implement Bluetooth Low Energy Security and Privacy in Wireless Devices - Contract Engineering, Product Design & Development Company - Cardinal Peak](https://www.cardinalpeak.com/wp-content/uploads/2021/02/BLE-Security-blog_fig-1-device-tracking-through-static-MAC-address-advertising-1024x610-1.png)
How to Implement Bluetooth Low Energy Security and Privacy in Wireless Devices - Contract Engineering, Product Design & Development Company - Cardinal Peak
![Guide to improve the security posture of Bluetooth Low Energy-enabled applications | by Kang Hao | CSG @ GovTech | Medium Guide to improve the security posture of Bluetooth Low Energy-enabled applications | by Kang Hao | CSG @ GovTech | Medium](https://cdn-images-1.medium.com/fit/t/1600/480/0*5CHlLb7m5u-k4nAJ.png)
Guide to improve the security posture of Bluetooth Low Energy-enabled applications | by Kang Hao | CSG @ GovTech | Medium
![How to Implement Bluetooth Low Energy Security and Privacy in Wireless Devices - Contract Engineering, Product Design & Development Company - Cardinal Peak How to Implement Bluetooth Low Energy Security and Privacy in Wireless Devices - Contract Engineering, Product Design & Development Company - Cardinal Peak](https://www.cardinalpeak.com/wp-content/uploads/2021/02/BLE-Security-blog_fig-3-1024x730-1.png)