Год издания: 2014
As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.
Intensively hands–on training for real–world network forensics.
Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands–on all the way by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn–by–doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light.
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Linux on a supported Android device. In Security Testing with Kali NetHunter, you will see the basic usage of NetHunter as we walk through the entire NetHunter tool menu, and learn by doing with hands on step-by-step tutorials.
Kali NetHunter Introduction and Overview
Shodan App (the Hackers Google)
Using cSploit & DriveDroid
Exploiting Windows and Linux Systems
Human Interface Device Attacks