This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things", such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.
In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them.
|Product dimensions:||8.50(w) x 11.00(h) x 0.34(d)|