WELCOME TO BSDU - KNOWLEDGE RESOURCE CENTER


BHARTIYA SKILL DEVELOPMENT UNIVERSITY, JAIPUR
KNOWLEDGE RESOURCE CENTER (LIBRARY)
Online Public Access catalogue(OPAC)

“Library is a heart of an institution" ― Dr S. Radhakrishnan

“Never Stop Reading"

Abusing the Internet of Things: Blackouts, freakouts and stakeouts (Record no. 2418)

000 -LEADER
fixed length control field 02306nam a22002297a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200116095141.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200116b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-93-5213-217-1
028 ## - PUBLISHER NUMBER
Source Allied Informatics, Jaipur
Bill Number 7084
Bill Date 13/01/2020
Purchase Year 2019-20
040 ## - CATALOGING SOURCE
Original cataloging agency BSDU
Language of cataloging English
Transcribing agency BSDU
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number DHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Dhanjani, Nitesh
245 ## - TITLE STATEMENT
Title Abusing the Internet of Things: Blackouts, freakouts and stakeouts
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Mumbai
Name of publisher, distributor, etc. Shroff Publishers & Distributors Pvt. Ltd.
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent 143
500 ## - GENERAL NOTE
General note A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.

If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics.

Analyze the design, architecture, and security issues of wireless lighting systems
Understand how to breach electronic door locks and their wireless mechanisms
Examine security design flaws in remote-controlled baby monitors
Evaluate the security design of a suite of IoT-connected home products
Scrutinize security vulnerabilities in smart TVs
Explore research into security weaknesses in smart cars
Delve into prototyping techniques that address security in initial designs
Learn plausible attacks scenarios based on how people will likely use IoT devices
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Contents
Lights Out-Hacking Wireless Lightbulbs to cause Sustained Blackouts
Electronic Lock Picking-Abusing Door Locks to Compromise Physical Security
Assaulting the Radio Nurse-Breaching Bany Monitors and one other Thing
Blurred Lines-When the Physical Space Meets the Virtual Space
The Idiot Box- Attacking "Smart" Televisions
Connected Car Security Analysis- Form Gas to Fully Electric
Secure Prototyping-littelBits and cloudBits
Securely Enabling Our Future- A Conversation on Upcoming Attack Vectors
Two Scenarios- Intentions and Outcomes
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element CSE
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last checked out Cost, replacement price Price effective from Koha item type
          BSDU Knowledge Resource Center, Jaipur BSDU Knowledge Resource Center, Jaipur General Stacks 2020-01-16 675.00 1 005.8 DHA 017972 2020-08-19 2020-08-18 675.00 2020-01-16 Books

2019. All rights reserved.
Implemented & Maintained by Total IT Software Solutions Pvt. Ltd.