A future with billions of connected "things" includes monumental
security concerns. This practical book explores how malicious
attackers can abuse popular IoT-based devices, including wireless
LED lightbulbs, electronic door locks, baby monitors, smart TVs,
and connected cars. If you're part of a team creating applications
for Internet-connected devices, this guide will help you explore
security solutions. You'll not only learn how to uncover
vulnerabilities in existing IoT devices, but also gain deeper
insight into an attacker's tactics. Analyze the design,
architecture, and security issues of wireless lighting systems
Understand how to breach electronic door locks and their wireless
mechanisms Examine security design flaws in remote-controlled baby
monitors Evaluate the security design of a suite of IoT-connected
home products Scrutinize security vulnerabilities in smart TVs
Explore research into security weaknesses in smart cars Delve into
prototyping techniques that address security in initial designs
Learn plausible attacks scenarios based on how people will likely
use IoT devices
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!