Difference between revisions of "Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts"
Jump to navigation
Jump to search
Stuffsyncbot (talk | contribs) (Automatic literature update) |
Stuffsyncbot (talk | contribs) (Automatic literature update) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Literature|device_name=Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-8hSuwOeqnY.jpeg|type=Book|author=Nitesh Dhanjani|language=English|isbn=978-1491902332|publisher=O'Reilly UK Ltd. (2015)|pages=107|references=https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/|description= | {{Literature|device_name=Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-8hSuwOeqnY.jpeg|type=Book|author=Nitesh Dhanjani|language=English|isbn=978-1491902332|publisher=O'Reilly UK Ltd. (2015)|pages=107|references=https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/|description= A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. | ||
If | If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.}} |
Latest revision as of 17:50, 1 February 2024
Type | Book |
Author | Nitesh Dhanjani |
Language | English |
Publisher | O'Reilly UK Ltd. (2015) |
ISBN | 978-1491902332 |
Pages | 107 |
Book Description
A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.
References
https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/