This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things", such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car. In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them.
"synopsis" may belong to another edition of this title.
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things", such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car. In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9781542329156
Quantity: 1 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 386. Seller Inventory # C9781542329156
Quantity: Over 20 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLING22Oct2817100149503
Quantity: Over 20 available