Abusing the Internet of Things Abusing the Internet of Things

Abusing the Internet of Things

Blackouts, Freakouts, and Stakeouts

    • 43,99 €
    • 43,99 €

Beschreibung des Verlags

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

— Cory Doctorowauthor, co-editor of Boing Boing
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.
Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

GENRE
Computer und Internet
ERSCHIENEN
2015
13. August
SPRACHE
EN
Englisch
UMFANG
296
Seiten
VERLAG
O'Reilly Media
GRÖSSE
42,5
 MB

Mehr ähnliche Bücher

Seven Deadliest Wireless Technologies Attacks Seven Deadliest Wireless Technologies Attacks
2010
The IoT Architect's Guide to Attainable Security and Privacy The IoT Architect's Guide to Attainable Security and Privacy
2019
InfoSecurity 2008 Threat Analysis InfoSecurity 2008 Threat Analysis
2011
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide Certified Ethical Hacker (CEH) v11 312-50 Exam Guide
2022
Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers
2016
Hacking Exposed 7 Hacking Exposed 7
2012

Mehr Bücher von Nitesh Dhanjani

Network Security Tools Network Security Tools
2005
Hacking: The Next Generation Hacking: The Next Generation
2009