We a good story
Quick delivery in the UK

Books by Nitesh Dhanjani

Filter
Filter
Sort bySort Popular
  • - Blackouts, Freakouts, and Stakeouts
    by Nitesh Dhanjani
    £40.49

    This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "e;things"e; includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.If youre part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. Youll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attackers tactics.Analyze the design, architecture, and security issues of wireless lighting systemsUnderstand how to breach electronic door locks and their wireless mechanismsExamine security design flaws in remote-controlled baby monitorsEvaluate the security design of a suite of IoT-connected home productsScrutinize security vulnerabilities in smart TVsExplore research into security weaknesses in smart carsDelve into prototyping techniques that address security in initial designsLearn plausible attacks scenarios based on how people will likely use IoT devices

  • by Nitesh Dhanjani
    £28.99

    This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools.

  • by Nitesh Dhanjani
    £32.99

    The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications and social networking sites.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.