Vendeur : HPB-Red, Dallas, TX, Etats-Unis
EUR 25,60
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 34,41
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
EUR 36,77
Quantité disponible : 5 disponible(s)
Ajouter au panierPaperback or Softback. Etat : New. The Iot Hacker's Handbook: A Practical Guide to Hacking the Internet of Things. Book.
Vendeur : Lakeside Books, Benton Harbor, MI, Etats-Unis
EUR 33,36
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 36,20
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 38,13
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 32,88
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni
EUR 35,22
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 44,65
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 48,12
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 51,74
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 54,95
Quantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 320 pages. 9.00x6.00x0.75 inches. In Stock.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 49,93
Quantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 82,64
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 47,61
Quantité disponible : 1 disponible(s)
Ajouter au panierpaperback. Etat : Sehr gut. Gebraucht - Sehr gut SG - Aufl., - leichte Beschädigungen, Verschmutzungen, ungelesenes Mängelexemplar, gestempelt - Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Vendeur : preigu, Osnabrück, Allemagne
EUR 49,35
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. The IoT Hacker's Handbook | A Practical Guide to Hacking the Internet of Things | Aditya Gupta | Taschenbuch | xviii | Englisch | 2019 | APRESS L.P. | EAN 9781484242995 | Verantwortliche Person für die EU: APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 59,55
Quantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware - Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers.The IoT Hacker's Handbookbreaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.What You'll LearnPerform a threat model of a real-world IoT device and locate all possible attacker entry pointsUse reverse engineering of firmware binaries to identify security issuesAnalyze,assess, and identify security issues inexploited ARM and MIPS based binariesSniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBeeWho This Book is ForThose interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Vendeur : medimops, Berlin, Allemagne
EUR 17,95
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 86,01
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 86,65
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND.