Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Amazon Price: N/A (as of April 22, 2019 11:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

Product Details

  • File Size: 37784 KB
  • Print Length: 298 pages
  • Page Numbers Source ISBN: 1491902337
  • Simultaneous Device Usage: Unlimited
  • Publisher: O’Reilly Media; 1 edition (August 13, 2015)
  • Publication Date: August 13, 2015
  • Sold by:  Amazon Digital Services LLC
  • Language: English
  • ASIN: B013VQ7N36
  • Text-to-Speech: Enabled
  • X-Ray: Not Enabled
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Screen Reader: Supported
  • Enhanced Typesetting: Enabled