Difference between revisions of "Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts"
Jump to navigation
Jump to search
Stuffsyncbot (talk | contribs) (Automatic literature update) |
|||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{Literature|device_name=Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-8hSuwOeqnY.jpeg|type=Book|author=Nitesh Dhanjani|language=English|isbn=978-1491902332|publisher=O'Reilly UK Ltd. (2015)|pages=107|references=https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/|description= A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. | |||
= | |||
| Nitesh Dhanjani | |||
| English | |||
|- | |||
| O | |||
| | |||
| | |||
|- | |||
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.}} | |||
If | |||
Latest revision as of 17:50, 1 February 2024
Type | Book |
Author | Nitesh Dhanjani |
Language | English |
Publisher | O'Reilly UK Ltd. (2015) |
ISBN | 978-1491902332 |
Pages | 107 |
Book Description
A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.
References
https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/