|
Showing 1 - 1 of
1 matches in All Departments
Geared towards security researchers, IT teams, and penetration
testers, application testers, developers, and IT administrators,
this book teaches readers how to get started with hacking Internet
connected devices. Readers dig deep into technical (and related
legal) issues, as they learn what kinds of devices to use as
hacking tools and which make the best targets. The authors, all
experts in the field, cover the kinds of vulnerabilities found in
IoT devices, explain how to exploit their network protocols, and
how to leverage security flaws and certain hardware interfaces
found in the physical devices themselves.
|
You may like...
Cold Pursuit
Liam Neeson, Laura Dern
Blu-ray disc
R39
Discovery Miles 390
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.