Abusing the Internet of things : blackouts, freakouts, and stakeouts / Nitesh Dhanjani.
Material type: TextPublisher: Sebastopol, CA : O'Reilly, 2015Edition: 1st EditionDescription: xvii, 274 pages : illustrations (black and white) ; 24 cmContent type: text | still image Media type: unmediated Carrier type: volumeISBN: 9781491902332 (pbk.) :Subject(s): Computer networks -- Security measures | Computer crimes -- Prevention | Internet of thingsDDC classification: 005.8 Summary: The upcoming IoT age will blur the line between our physical and online lives. Attacks targeting our online spaces will put our physical security at risk. Traditionally, the attack vectors to our fundamental luxuries have required physical tampering, mostly because access to the infrastructure has been limited from the Internet. This is about to change with the upcoming disruption caused by a future with billions of 'things' connected to the Internet. This book takes a fascinating look into abusing the most popular IoT-based devices already available in the market. Its goal is to demonstrate tangible risk in IoT devices that we're going to depend on more and more as time progresses.Item type | Current library | Home library | Shelving location | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|---|
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 DHA (Browse shelf(Opens below)) | Available | 06306551 | |||
Book | Paul Hamlyn Library | Paul Hamlyn Library | Floor 1 | 005.8 DHA (Browse shelf(Opens below)) | Available | 06306578 |
Includes QR code.
Includes index.
The upcoming IoT age will blur the line between our physical and online lives. Attacks targeting our online spaces will put our physical security at risk. Traditionally, the attack vectors to our fundamental luxuries have required physical tampering, mostly because access to the infrastructure has been limited from the Internet. This is about to change with the upcoming disruption caused by a future with billions of 'things' connected to the Internet. This book takes a fascinating look into abusing the most popular IoT-based devices already available in the market. Its goal is to demonstrate tangible risk in IoT devices that we're going to depend on more and more as time progresses.
There are no comments on this title.