Abusing the Internet of Things Abusing the Internet of Things

Abusing the Internet of Things

Blackouts, Freakouts, and Stakeouts

    • $62.99
    • $62.99

Publisher Description

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

— Cory Doctorowauthor, co-editor of Boing Boing
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.
Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

GENRE
Computing & Internet
RELEASED
2015
13 August
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
O'Reilly Media
SELLER
O Reilly Media, Inc.
SIZE
42.5
MB
Seven Deadliest Wireless Technologies Attacks Seven Deadliest Wireless Technologies Attacks
2010
The IoT Architect's Guide to Attainable Security and Privacy The IoT Architect's Guide to Attainable Security and Privacy
2019
Mobile Malware Attacks and Defense Mobile Malware Attacks and Defense
2008
InfoSecurity 2008 Threat Analysis InfoSecurity 2008 Threat Analysis
2011
Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers
2016
Hacking Exposed 7 Hacking Exposed 7
2012
Network Security Tools Network Security Tools
2005
Hacking: The Next Generation Hacking: The Next Generation
2009