This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things", such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car. In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 35,60 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: CitiRetail, Stevenage, Regno Unito
Paperback. Condizione: new. Paperback. This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things", such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car. In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Codice articolo 9781542329156
Quantità: 1 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 386. Codice articolo C9781542329156
Quantità: Più di 20 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLING22Oct2817100149503
Quantità: Più di 20 disponibili