Librería: medimops, Berlin, Alemania
EUR 22,57
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
Librería: WeBuyBooks, Rossendale, LANCS, Reino Unido
EUR 35,43
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
EUR 36,19
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoPaperback or Softback. Condición: New. The Iot Hacker's Handbook: A Practical Guide to Hacking the Internet of Things 1.05. Book.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 40,39
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 33,86
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 52,29
Convertir monedaCantidad disponible: 8 disponibles
Añadir al carritoPaperback. Condición: New. Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 37,52
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 51,25
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPAP. Condición: New. New Book. Shipped from UK. Established seller since 2000.
EUR 56,14
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPAP. Condición: New. New Book. Shipped from UK. Established seller since 2000.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 52,05
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Best Price, Torrance, CA, Estados Unidos de America
EUR 32,35
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. SUPER FAST SHIPPING.
EUR 56,67
Convertir monedaCantidad disponible: 8 disponibles
Añadir al carritoPaperback. Condición: New. Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 47,61
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: Sehr gut. Gebraucht - Sehr gut SG - Aufl., - leichte Beschädigungen, Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 44,05
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 47,46
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 54,18
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 320 pages. 9.00x6.00x0.75 inches. In Stock.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 50,23
Convertir monedaCantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 55,66
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware - Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
EUR 58,84
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. 320 pp. Englisch.
EUR 58,84
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. 320 pp. Englisch.
EUR 58,84
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
EUR 58,84
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.Libri GmbH, Europaallee 1, 36244 Bad Hersfeld 320 pp. Englisch.
Publicado por Apress (edition 1st ed.), 2019
ISBN 10: 1484242998 ISBN 13: 9781484242995
Idioma: Inglés
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
Original o primera edición
EUR 25,33
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Good. 1st ed. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 81,19
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 82,72
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: Lakeside Books, Benton Harbor, MI, Estados Unidos de America
EUR 32,83
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 35,62
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 85,46
Convertir monedaCantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: Grand Eagle Retail, Mason, OH, Estados Unidos de America
Original o primera edición
EUR 43,01
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Take a practioners approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. Youll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What Youll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: AussieBookSeller, Truganina, VIC, Australia
Original o primera edición
EUR 82,23
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Take a practioners approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. Youll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What Youll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.