Abusing the Internet of Things Abusing the Internet of Things

Abusing the Internet of Things

Blackouts, Freakouts, and Stakeouts

    • 43,99 €
    • 43,99 €

Publisher Description

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

— Cory Doctorowauthor, co-editor of Boing Boing
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.
Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

GENRE
Computing & Internet
RELEASED
2015
13 August
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
O'Reilly Media
SIZE
42.5
MB

More Books by Nitesh Dhanjani

Network Security Tools Network Security Tools
2005
Hacking: The Next Generation Hacking: The Next Generation
2009