没有合适的资源?快使用搜索试试~ 我知道了~
资源详情
资源评论
资源推荐
Nitesh Dhanjani
Abusing
the Internet
of Things
Blackouts, Freakouts, and Stakeouts
ISBN: 978-1-491-90233-2
US $49.99 CAN $57.99
“
This book should serve as a
wakeup call that if security does
not become a priority when
building these devices, this new
‘Internet of Things’ will soon
become the ‘Internet of
Dangerous Things.'
”
—Kevin DePeugh
VP of Cyber Security, Kaiser Permanente
“
This book is a must-read for anyone
involved with securing smart
homes and IoT devices… Nitesh has
generously shared his vast technical
know-how and the security
industry should study this book and
take his warnings to heart.
”
—Ryan Naraine
head of Kaspersky Research Center, USA
“
This text is packed with practical
examples of the insecurity of
everyday devices, described not in
the language of theory, but in the
inescapable truth of code, packet
captures, and observable eects.
”
—Richard Bejtlich
chief security strategist, FireEye
Internet / Security
Twitter: @oreillymedia
facebook.com/oreilly
oreilly.com
Abusing the Internet of Things
Blackouts, Freakouts, and Stakeouts
A future with billions of connected “things” includes monumental security
concerns. This practical book explores how malicious attackers can abuse
popular IoT-based devices, including wireless LED lightbulbs, electronic
door locks, baby monitors, smart TVs, and connected cars.
If you’re part of a team creating applications for Internet-connected
devices, this guide will help you explore security solutions. You’ll not
only learn how to uncover vulnerabilities in existing IoT devices, but also
gain deeper insight into an attacker’s tactics.
■ Analyze the design, architecture, and security issues of wireless
lighting systems
■ Understand how to breach electronic door locks and their
wireless mechanisms
■ Examine security design flaws in remote-controlled baby
monitors
■ Evaluate the security design of a suite of IoT-connected
home products
■ Scrutinize security vulnerabilities in smart TVs
■ Explore research into security weaknesses in smart cars
■ Delve into prototyping techniques that address security in
initial designs
■ Learn plausible attack scenarios based on how people will
likely use IoT devices
Nitesh Dhanjani is a well-known security researcher, author, and
speaker. He’s the author of Hacking: The Next Generation (O’Reilly),
Network Security Tools (O’Reilly), and HackNotes: Linux and Unix
Security (Osborne McGraw-Hill). Media outlets such as CNN, Reuters,
MSNBC, and Forbes have reported on Dhanjani’s work.
Praise for this book
Nitesh encapsulates the IoT security paradox in concise examples
that enlighten the reader with the real-world problem of interconnected
devices and the multifaceted problems they pose.
—Brian Hanson, security executive
This book uncovers security vulnerabilities that are going to infect billions of interconnected
devices in the near future. It provides practical guidance to address the upcoming security
risks that consumers, designers, and students should learn from.
—Prof. Elias Houstis, Emeritus Professor
of Purdue University and the University
of Thessaly
Throughout his career, Nitesh has distinguished himself by remaining on the forefront of
technically advanced information security trends, and understanding the impact that they
have on both businesses and consumers. With his book Abusing the Internet of Things, Nitesh
eectively demonstrates the potential impact that insucient security can have on
mainstream society if its dangers are not considered from the onset of design.
—Lee J. Kushner, president of LJ Kushner
& Associates
Attacks against the IoT will dominate headlines for the next few years. Some
will be over hyped and some will be much worse than people think. This book
is a no-nonsense dive into the world of proling and attacking these devices.
—Haroon Meer,
Founder of Thinkst Applied Research
As society ponders the implications associated with proliferation of connected devices, Nitesh
shows us real examples of challenges we will face in a connected world. A sobering glimpse of
what’s in store for us and the devices we’ve come to depend on.
—Billy Rios, Founder of Whitescope.io
In this book, Nitesh gives in very specic step by step examples how attacks against the
Internet of Things can be achieved. He illustrates how we should not make the same mistakes
of the past. Since IoT devices are connected to the physical world, the consequences of
security vulnerabilities can be huge.
—Gustavo Rodriguez-Rivera, Continuing
Lecturer, Computer Science Department,
Purdue University
Abusing the IoT is an excellent starting point for those interested in threats and attacks faced
by the next generation of connected devices. Nitesh covers a variety of case studies, from
causing a blackout on an “intelligent” lighting system to remotely locating and unlocking a
Tesla electric car—sometimes using simple tricks and techniques prevalent in the ’90s.
Nitesh has the ability to explain both high-level design defects and low-level technical
implementation failures with ease and clarity across his book. To me, it reinforces one of my
infosec maxims: the more things change, the more they remain the same.
—Saumil Shah, CEO of Net-Square
Nitesh Dhanjani
Abusing the
Internet of Things
Blackouts, Freakouts, and Stakeouts
剩余290页未读,继续阅读
xinconan2
- 粉丝: 268
- 资源: 400
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论1