Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
The Iot hacker's handbook : a practical guide to hacking the Internet of things
by
Gupta, Aditya, author
in
Internet of things Security measures.
/ Hacking.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
The Iot hacker's handbook : a practical guide to hacking the Internet of things
by
Gupta, Aditya, author
in
Internet of things Security measures.
/ Hacking.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
The Iot hacker's handbook : a practical guide to hacking the Internet of things
Book
The Iot hacker's handbook : a practical guide to hacking the Internet of things
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You'll Learn: Perform a threat model of a real-world IoT device and locate all possible attacker entry points -- Use reverse engineering of firmware binaries to identify security issues -- Analyze, assess, and identify security issues in exploited ARM and MIPS based binaries -- Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee.
Publisher
Apress
ISBN
9781484242995, 1484242998
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5105.8857.G86 2019 | 1 | BOOK | GENERAL |
This website uses cookies to ensure you get the best experience on our website.