Difference between revisions of "Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts"
Jump to navigation
Jump to search
Stuffsyncbot (talk | contribs) (Automatic literature update) |
|||
Line 1: | Line 1: | ||
{{Literature|device_name=Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-8hSuwOeqnY.jpeg|type=Book|author=Nitesh Dhanjani|language=English|isbn=978-1491902332|publisher=O'Reilly UK Ltd. (2015)|pages=107|references=https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/|description="A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. | |||
= | |||
| Nitesh Dhanjani | |||
| English | |||
|- | |||
| O | |||
| | |||
| | |||
|- | |||
If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics."}} | |||
If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics. | |||
Revision as of 23:16, 8 April 2021
Type | Book |
Author | Nitesh Dhanjani |
Language | English |
Publisher | O'Reilly UK Ltd. (2015) |
ISBN | 978-1491902332 |
Pages | 107 |
Book Description
"A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics."
References
https://www.oreilly.com/library/view/abusing-the-internet/9781491902899/