Siirry suoraan sisältöön
Abusing the Internet of Things
Abusing the Internet of Things
Tallenna

Abusing the Internet of Things

Lue Adobe DRM-yhteensopivassa e-kirjojen lukuohjelmassaTämä e-kirja on kopiosuojattu Adobe DRM:llä, mikä vaikuttaa siihen, millä alustalla voit lukea kirjaa. Lue lisää
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "e;things"e; includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.If youre part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. Youll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attackers tactics.Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices
Alaotsikko
Blackouts, Freakouts, and Stakeouts
Kirjailija
Nitesh Dhanjani
ISBN
9781491902936
Kieli
englanti
Julkaisupäivä
13.8.2015
Kustantaja
O'Reilly Media
Formaatti
  • PDF - Adobe DRM
Lue e-kirjoja täällä
  • Lue e-kirja mobiililaitteella/tabletilla
  • Lukulaite
  • Tietokone