Price: [price_with_discount]
(as of [price_update_date] – Details)

[ad_1]

From the Publisher

Copy of Practical IoT Hacking on black background with No Starch Press logoCopy of Practical IoT Hacking on black background with No Starch Press logo

Spread of Practical IoT Hacking on yellow backgroundSpread of Practical IoT Hacking on yellow background

Copies of Practical IoT Hacking on black backgroundCopies of Practical IoT Hacking on black background

Spread of Practical IoT Hacking on yellow backgroundSpread of Practical IoT Hacking on yellow background

‘Hits the Mark’

“I recommend this book to anyone technical who manufactures IoT devices or anyone with IoT devices in their homes or enterprise. At a time when securing our systems and protecting our information has never been more important, this book hits the mark.”

—Dave Kennedy, founder of TrustedSec, Binary Defense

‘A Precious Resource’

“This book is everything you would want to learn from the subject masters—it is an authoritative and a precious resource that both IoT security researchers and developers will want keep close by. I recommend this book for anyone interested in making IoT more secure.”

—John Moor, Managing Director, IoT Security Foundation

‘Superbly Approachable’

The authors are immediately credible on the topic, the content is superbly approachable, and it’s obvious this book and its readers will have a meaningful positive impact on the topic.”

—Robert M. Lee, CEO and Co-Founder of Dragos, Inc. and Senior SANS Instructor

About the Authors

Fotios (Fotis) Chantzis (@ithilgore) is laying the foundation for a safe and secure Artificial General Intelligence (AGI) at OpenAI. Previously, he worked as a principal information security engineer at Mayo Clinic, where he managed and conducted technical security assessments on medical devices, clinical support systems, and critical healthcare infrastructure. He has been a member of the core Nmap development team since 2009, when he wrote Ncrack under the mentorship of Gordon “Fyodor” Lyon, the original author of Nmap, during the Google Summer of Code. He later worked as a mentor for the Nmap project during the Google Summer of Code 2016 and 2017 and has authored a video course about Nmap. His research on network security includes exploiting the TCP Persist Timer (you can find his paper on the topic published in Phrack #66) and inventing a stealthy port scanning attack by abusing XMPP. Fotis has presented at notable security conferences, including DEF CON. Highlights of his work can be found at his site sock-raw.org.

Ioannis Stais (@Einstais) is a senior IT security researcher and head of red teaming at CENSUS S.A., a company that offers specialized cybersecurity services to customers worldwide. Ioannis has participated in more than 100 security assessment projects, including the assessment of communication protocols, web and mobile banking services, NFC payment systems, ATMs and point-of-sale systems, critical medical appliances, and MDM solutions. He holds a master’s degree in computer systems technology from the University of Athens. His research currently focuses on the development of machine learning algorithms for improving vulnerability research, the enhancement of fuzzing frameworks, and an exploration of the current threats in mobile and web applications. He has presented his research at security conferences such as Black Hat Europe, Troopers NGI, and Security BSides Athens.

Paulino Calderon (@calderpwn) is a published author and international speaker with over 12 years of experience in network and application security. When he isn’t traveling to security conferences or consulting for Fortune 500 companies with Websec, a company he co-founded in 2011, he spends peaceful days enjoying the beach in Cozumel, Mexico. He loves open source software and has contributed to many projects, including Nmap, Metasploit, OWASP Mobile Security Testing Guide (MSTG), OWASP Juice Shop, and OWASP IoT Goat.

Evangelos Deirmentzoglou (@edeirme) is an information security professional interested in solving security problems at scale. He led and structured the cybersecurity capability of the financial tech startup Revolut. A member of the open source community since 2015, he has made multiple contributions to Nmap and Ncrack. He is currently researching a cybersecurity PhD focusing on source code analysis, which he has previously applied for many major US technology vendors, Fortune 500 companies, and financial and medical institutions.

Beau Woods (@beauwoods) is a cyber safety innovation fellow with the Atlantic Council and a leader with the I Am The Cavalry grassroots initiative. He is also the founder and CEO of Stratigos Security and sits on the board of several nonprofits. In his work, which bridges the gap between the security research and public policy communities, he ensures that any connected technology able to impact human safety is worthy of our trust. He formerly served as an entrepreneur in residence with the US FDA and a managing principal consultant at Dell SecureWorks. He has spent the past several years consulting with the energy, healthcare, automotive, aviation, rail, and IoT industries, as well as with cybersecurity researchers, US and international policymakers, and the White House. Beau is a published author and frequent public speaker.

Who Should Read This Book

No two people share identical backgrounds and experience. Yet analyzing IoT devices requires skills spanning nearly every domain of expertise, because these devices combine computing power and connectivity into every facet of our world. We can’t predict which parts of this book each person will find the most compelling. But we believe that making this knowledge available to a broad population gives them power to have greater control over their increasingly digitizing world.

This book is initially for hackers (sometimes called security researchers), although we expect that it will be useful to others as well, such as the following individuals:

• A security researcher might use this book as a reference for experimenting with an IoT ecosystem’s unfamiliar protocols, data structures, components, and concepts.

• An enterprise sysadmin or network engineer might learn how to better protect their environment and their organization’s assets.

• A product manager for an IoT device might discover new requirements their customers will assume are already present and build them in, reducing cost and the time it takes the product to reach the market.

• A security assessor might discover a new set of skills to better serve their clients.

• A curious student might find knowledge that will catapult them into a rewarding career of protecting people.

This book was written assuming the reader already has some familiarity with Linux command line basics, TCP/IP networking concepts, and coding.

No Starch Press logo. A black circle with a white iron with a star in the centerNo Starch Press logo. A black circle with a white iron with a star in the center

About the Publisher

No Starch Press has published the finest in geek entertainment since 1994, creating both timely and timeless titles like Python Crash Course, Python for Kids, How Linux Works, and Hacking: The Art of Exploitation. An independent, San Francisco-based publishing company, No Starch Press focuses on a curated list of well-crafted books that make a difference. They publish on many topics, including computer programming, cybersecurity, operating systems, and LEGO. The titles have personality, the authors are passionate experts, and all the content goes through extensive editorial and technical reviews. Long known for its fun, fearless approach to technology, No Starch Press has earned wide support from STEM enthusiasts worldwide.

Publisher ‏ : ‎ No Starch Press (April 9, 2021)
Language ‏ : ‎ English
Paperback ‏ : ‎ 464 pages
ISBN-10 ‏ : ‎ 1718500904
ISBN-13 ‏ : ‎ 978-1718500907
Item Weight ‏ : ‎ 1.95 pounds
Dimensions ‏ : ‎ 7.06 x 1.1 x 9.25 inches
[ad_2]