17897570758_79b8b6566d_b

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

[wpramazon asin="1498723187" keyword="IoT Security"]
[wpramazon asin="1491902337" keyword="IoT Security"]

More IoT Security Products

Photo credit: aotaro via Foter.com / CC BY

3 comments

  1. 2 of 2 people found the following review helpful
    4.0 out of 5 stars
    Great resource on IoT security, December 6, 2015
    By 
    AtlasShrugged (Austin, Texas, US) -

    This is a great resource to understand the current IoT security landscape, along with examples and hacks. All topics are well explained with well coordinated flow of chapters. It would have been better if the book could also cover security aspects from IoT cloud providers and best practices around it. Best resource available so far on this subject. Highly recommend.

    0

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

  2. 2 of 2 people found the following review helpful
    5.0 out of 5 stars
    The current state of security is not good, September 13, 2015
    By 
    Bob Fraundorf (El Cerrito, CA United States) -

    This review is from: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts (Paperback)
    As we continue to plow down the road of adopting technology that directly places our lives and safety at risk it is essential to have contrarians with foresight that point out the failings of such technology. This book doesn't pretend to be a framework for securing IOT. It provides examples of vulnerability with detailed analysis of what went wrong. These unfortunately reflect the current state of security with regards to IOT. I hope this book influences others not only to not repeat these specific flaws but to construct meaningful frameworks for IOT security.

    0

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

  3. 4 of 4 people found the following review helpful
    5.0 out of 5 stars
    A cut above the rest!, September 3, 2015
    By 

    This review is from: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts (Paperback)
    Nitesh is one of my favorite technical authors and I'm extremely pleased that "Abusing the Internet of Things" is finally here. I can positively say that this is a must-have, must-read book for professionals trying to understand / investigate core security and privacy issues affecting consumer grade IOT products.

    I had the chance to read the book cover to cover prior to the final release and would like to say that the technical contents in this book is fantastic. I would like to highlight few of the concepts that Nitesh helped me understand:

    a) The feasibility and impact of cross device attacks in this age of "digitally syncing" all our devices
    b) Secure prototyping of IOT products using easily available DIY HW/SW kits
    c) Fundamental security issues affecting specific implementations of popular IOT protocols (Z-Wave and BLE (Bluetooth Low Energy))
    d) How to systematically dissect any given IOT product to identify "hard to find" HW/SW attack surfaces

    The examples in this book are elegant and very well sequenced. I especially liked the detailed deconstruction of specific attacks with code examples, HTTP requests and response snippets and relevant screenshots. That being said, this book is an easy read and like his previous books, the topics flow smoothly. If you are a builder or breaker of IOT products or just a curious security researcher, don't hesitate, just buy this book. It serves as a solid primer to IOT security.

    Thank You, Nitesh for writing this book. I look forward to your next book!

    0

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

Leave a Reply

Your email address will not be published. Required fields are marked *