Difference between revisions of "Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Automatic literature update)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[File:Abusing the Internet of Things.jpg|300px]]
{{Literature|device_name=Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-8hSuwOeqnY.jpeg|type=Book|author=Nitesh Dhanjani|language=English|isbn=978-1491902332|publisher=O'Reilly UK Ltd. (2015)|pages=107|references=https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/|description= A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
=== Information ===
{| class="wikitable"
|-
| Type
| Book
|-
| Author
| Nitesh Dhanjani  
|-
| Language
| English
|-
| Publisher
| O'Reilly UK Ltd. (2015)
|-
| ISBN
| 978-1491902332
|-
| Pages
| 107
|-
|}


=== Book Description ===
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.}}
 
"A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
 
If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics."<ref name="oreilly.com"> https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/ </ref>
 
== References ==
 
<references />
 
 
[[Category:Literature]]

Latest revision as of 17:50, 1 February 2024

accessory-image-8hSuwOeqnY.jpeg

Information
Type Book
Author Nitesh Dhanjani
Language English
Publisher O'Reilly UK Ltd. (2015)
ISBN 978-1491902332
Pages 107

Book Description

A future with billions of connected things includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.

References

https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/