Abusing the Internet of Things Abusing the Internet of Things

Abusing the Internet of Things

Blackouts, Freakouts, and Stakeouts

    • €43.99
    • €43.99

Publisher Description

This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

— Cory Doctorowauthor, co-editor of Boing Boing
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.
Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

GENRE
Computing & Internet
RELEASED
2015
13 August
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
O'Reilly Media
PROVIDER INFO
OREILLY MEDIA INC
SIZE
42.5
MB
The IoT Architect's Guide to Attainable Security and Privacy The IoT Architect's Guide to Attainable Security and Privacy
2019
Network and Data Security for Non-Engineers Network and Data Security for Non-Engineers
2016
How Cybersecurity Really Works How Cybersecurity Really Works
2021
Cybersecurity Cybersecurity
2021
Computer Security Basics Computer Security Basics
2006
The Network Security Test Lab The Network Security Test Lab
2015
Network Security Tools Network Security Tools
2005
Hacking: The Next Generation Hacking: The Next Generation
2009