Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things

      2 in stock

      Firm sale: non returnable item
      SKU 9781484242995 Categories ,
      Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'l...

      £49.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781484242995
      Product Form:Paperback / softback
      Country of Manufacture:US
      Title:The IoT Hacker's Handbook
      Subtitle:A Practical Guide to Hacking the Internet of Things
      Authors:Author: Aditya Gupta
      Page Count:320
      Subjects:Computer security, Computer security, Network security, Network security
      Description:Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You’ll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. 
      Take a practioner''s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

      You''ll review the architecture''s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You''ll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You''ll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. 

      As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker''s Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.

      What You''ll Learn
      • Perform a threat model of a real-world IoT device and locate all possible attacker entry points 
      • Use reverse engineering of firmware binaries to identify security issues 
      • Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries
      • Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee

      Who This Book is For

      Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. 


      Imprint Name:APress
      Publisher Name:APress
      Country of Publication:GB
      Publishing Date:2019-04-01

      Additional information

      Weight498 g
      Dimensions233 × 171 × 19 mm